Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork9
ricardojoserf/vulnserver-exploits
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
OS: Windows 7 SP1 version 6.1 (32 bits). All of them work (TRUN and GTERsocket reuse scripts must be updated).
GMON
- Vanilla Buffer Overflow
GTER
Egghunter
Socket reuse (buf variable must be updated, check notes)
HTER
- Hexadecimal encoding Buffer Overflow
KSTET
Egghunter
Socket reuse
LTER
- SEH (bypassing ASLR)
TRUN
Vanilla Buffer Overflow
Socket reuse (buf variable must be updated, check notes)
- Start Peach
C:\> peach.exe -a tcp- Run the "vulnserver.xml" Peach file and test the command you want:
C:\> peach.exe vulnserver.xml TestKSTET- Run the "vulnserver_boofuzz.py" Boofuzz file and test the command you want:
python vulnserver_boofuzz.py 192.168.112.145 9999 TRUN- Attach the process to OllyDbg to check when and how it crashes
Vulnserver:
- Download Vulnserver fromhttps://github.com/stephenbradshaw/vulnserver
Ollydbg:
- Download OllyDbg fromhttp://www.ollydbg.de/odbg110.zip
Peach (optional):
Download and install .NET 4 fromhttps://www.microsoft.com/en-us/download/details.aspx?id=17851
Download and install Windows SDK fromhttps://www.microsoft.com/en-us/download/details.aspx?id=8279
Download Peach fromhttps://sourceforge.net/projects/peachfuzz/
Boofuzz (optional)([docs]):
- pip install boofuzz
Fuzzing with Peach:
http://www.rockfishsec.com/2014/01/fuzzing-vulnserver-with-peach-3.html
https://sh3llc0d3r.com/fuzzing-vulnserver-with-peach/
KSTET Socket reuse
https://deceiveyour.team/2018/10/15/vulnserver-kstet-ws2_32-recv-function-re-use/
https://rastating.github.io/using-socket-reuse-to-exploit-vulnserver/
GTER Socket reuse
About
Vulnserver exploits
Topics
Resources
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Sponsor this project
Uh oh!
There was an error while loading.Please reload this page.

