Skip to content

Automation of buffer overflows corrupting the Saved Return Pointer.

Notifications You must be signed in to change notification settings

crake7/Binary-Exploitation-Tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

74 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Automating Binary Exploitation

Learn how to use Python to overflow a buffer, corrupting the Saved Return Pointer.

ToolsRequirementsStepsCredits


Do you want to learn how to automate your buffer overflows?

If you are preparing for the OSCP exam or simply want to learn more about buffer overflows, this repo is for you! It follows the 7 steps by "The Cyber Mentor" with links to his videos and the modified code I wrote.

Tools

  • A Windows 10 desktop. Download a virtual machine here
  • A vulnerable software: Vulnserver. Download the repo into a new folder.
  • Kali Linux or any other OS for offensive work. Download Kali's virtual image here
  • A debugger: Immunity Debugger. Download it here. (You will need to register in the link, so be creative.)

Requirements

Before we start learning. You will need to do the following:

  1. Temporarily disable Windows Defender Real-time protection. Confused? Info here
  2. Go to the saved Vulnserver folder and run the exe as admin.
  3. Run Immunity as admin.

Steps

Follow each of the 7 steps by first clicking the link to watch the "The Cyber Mentor" tutorial and then use the modified code I wrote on your network:

Folder Name Video Link
Spiking Video
Fuzzing Video
Find_EIP Video
Overwrite_EIP Video
Bad_chars Video
Right_Module Video
Exploit Video
Please note the scripts were modified to work with Python 3 and some of them were enhanced to fix common bugs.

Credits

This repo was created while watching the "Buffer Overflows Made Easy" Masterclass by "The Cyber Mentor". I want to thank him for putting out these videos. You can watch them in video or read them as doc.

To learn more about the changes in the code, I highly recommend to read Justin Steven's dostackbufferoverflowgood I also want to thank him for putting this amazing tutorial out there, and for answering some questions.

License

The code is licensed under the MIT License.

About

Automation of buffer overflows corrupting the Saved Return Pointer.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages