Skip to main content

Posts

Showing posts from May, 2020

Exploit Development Project

Basic Requirements for exploits   In here shows you how to identify a buffer overflow vulnerability and how to develop a buffer overflow exploit using Python and Ruby scripts within a Kali Linux attack VM.   Also use olly-dbg for debugging of the vulnserver executable. The victim VM will be a,   Windows 7 Professional 32-bit VM with vulnserver installed. Vulnserver is a windows-based multi-threaded TCP server that is intentionally vulnerable to buffer overflow. we're going to be exploiting the TRUN command in Vulnserver in order to a reverse shell with netcat.   In “Windows 7 Professional 32-bit VM” please make sure that the Windows Firewall is turned off and that your attack and victim VMs are able to ping one another. >>  GitHub Link >>   YouTube Link