Skip to content

Latest commit

 

History

History
75 lines (64 loc) · 3.28 KB

English.md

File metadata and controls

75 lines (64 loc) · 3.28 KB

BufferOverflowKiller v1.0

A tool for buffer overflow attacks

run

./BufferOverflowKiller.py

image

Module explanation

1. Change the destination ip address and port
2. Target program buffer overflow test
3. Get the program overflow boundary value
4. Exclude bad characters
5. Pwn the program and get the connection back shell

Actual demonstration

1. Set the destination IP and port

image image

2. Fuzz test the parameters of the target program to see if there is a buffer overflow vulnerability

image

It is found that the range of program overflow is within 2000 characters, and then the detailed overflow boundary value of the program is tested.

3. Test program detailed overflow boundary value

image

Then we go to the Immunity Debugger tool to view the value of the eip register of the program and record it, here is 6F43396E

image

Then enter the value of the eip address

image

The program concludes that the verbose overflow boundary is 1978 characters

exclude bad characters

We just ran the fourth module, here we go directly to the Immunity Debugger tool to exclude bad characters

image

Here we can see what the bad characters of the program are, and then we can easily rule them out

pwn

Run the fifth module, enter the local ip, port, bad characters, return address of the program

image image

Then we open another script and follow the supplementary script prompted by the program

image image

Listen to the set port, then run the program to get the shell

image

other

The tool can execute linux commands normally when running

image

When testing the bad characters of the program, if there are many bad characters in the program, the test can be repeated, which is very convenient