I’m trying to attack the vulnserver from different angles ( can be found here: http://sites.google.com/site/lupingreycorner/vulnserver.zip ). I’m stuck on fuzzing, I know which commands are vulnerable and all that. But I want to be able to reproduce the steps into my next project. My questing is, how would I figure out to use the /. manually in my exploit, where does that come from? without it there is no buffer overflow on the TRUN command. Yet I can’t seem to find a logical way to find it.
Related topics
Topic | Replies | Views | Activity | |
---|---|---|---|---|
Best resource for leaning exploits and vulnerabilities | 4 | 875 | March 23, 2020 | |
How to learn buffer overflow? | 8 | 1367 | May 2, 2021 | |
Buffer Overflow Practical Examples , Shellcode Injection and Local Privilege Escalation by 0xRick | 7 | 1646 | January 18, 2019 | |
Suhosin-Stack-based buffer overflow | 0 | 329 | June 4, 2018 | |
[PWN] Exploit - You know 0xDiablos in gdb | 0 | 1475 | October 15, 2020 |