All Questions
Tagged with metasploitbuffer-overflow
6 questions
0votes
1answer
492views
Buffer Overflow PoC code \x11(setup sound
I am reading the PWK course book, the chapter of Linux Buffer Overflow: Once the crossfire application is running, we can use the following Proof of Concept (PoC) code, found on the Exploit ...
1vote
0answers
246views
Limited ESP Length in Buffer Overflow Sample C Program
May I know how to increase the length of ESP on a sample c program which allows me to execute shellcode on the stack. However, as of now, the sample c program only has an ESP length of 61 thus ...
2votes
1answer
2kviews
Metasploit MsfVenom - Payload binds shell, but unable to spawn it with netcat
Running a SEH BoF exploit script that contains a payload that is generated from msfvenom as such: msfvenom --payload windows/shell/bind_tcp --format py --arch x86 --platform windows --bad-chars "\...
4votes
3answers
5kviews
Install a vulnerable service for Windows 7
I have some kind of a project or demonstration, where I have to exploit Windows 7 to get a remote shell. I did a vulnerability scan with nessus on my Windows 7 machine, but I didn't find any kind of ...
2votes
1answer
481views
Is my understanding of buffer overflows correct?
I am new to pentesting and wondering if my current understanding of buffer overflow exploits is correct. Assuming an operating address space of 3 addresses, an instruction space of 2 addresses, and an ...
2votes
0answers
896views
Metasploit pattern not working for buffer overflow for SLMail 5.5 [closed]
I'm trying to do a buffer overflow on SLMail 5.5. I see where EIP is when I send 2606 A's to the program using my script. However, I cannot get the Metasploit pattern creator to work. I want to use ...