Skip to main content

All Questions

0votes
1answer
492views

Buffer Overflow PoC code \x11(setup sound

I am reading the PWK course book, the chapter of Linux Buffer Overflow: Once the crossfire application is running, we can use the following Proof of Concept (PoC) code, found on the Exploit ...
TJCLK's user avatar
1vote
0answers
246views

Limited ESP Length in Buffer Overflow Sample C Program

May I know how to increase the length of ESP on a sample c program which allows me to execute shellcode on the stack. However, as of now, the sample c program only has an ESP length of 61 thus ...
NoPurposeInLife's user avatar
2votes
1answer
2kviews

Metasploit MsfVenom - Payload binds shell, but unable to spawn it with netcat

Running a SEH BoF exploit script that contains a payload that is generated from msfvenom as such: msfvenom --payload windows/shell/bind_tcp --format py --arch x86 --platform windows --bad-chars "\...
0x5929's user avatar
4votes
3answers
5kviews

Install a vulnerable service for Windows 7

I have some kind of a project or demonstration, where I have to exploit Windows 7 to get a remote shell. I did a vulnerability scan with nessus on my Windows 7 machine, but I didn't find any kind of ...
Sidahmed's user avatar
2votes
1answer
481views

Is my understanding of buffer overflows correct?

I am new to pentesting and wondering if my current understanding of buffer overflow exploits is correct. Assuming an operating address space of 3 addresses, an instruction space of 2 addresses, and an ...
ThePracticalCryptographer's user avatar
2votes
0answers
896views

Metasploit pattern not working for buffer overflow for SLMail 5.5 [closed]

I'm trying to do a buffer overflow on SLMail 5.5. I see where EIP is when I send 2606 A's to the program using my script. However, I cannot get the Metasploit pattern creator to work. I want to use ...
Gary West's user avatar

close