Skip to content

You Can Found Various Exploits that are used for practice and Gain experience on PenTesting Methodologies

License

Notifications You must be signed in to change notification settings

purple-claw/Exploits-Shellcodes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Exploits-Shellcodes

You Can Found Various Exploits that are used for practice and Gain experience on PenTesting Methodologies

SyncBreeze(BufferOverFlow-REMOTE)

Python based fuzzing scripts and exploits.That are used to leverage an remote buffer overflow vulnerability in the syncbreeze 10.0.28 application.

Download Syncbreeze enterprise from exploit db https://www.exploit-db.com/exploits/42928

Install it in your local windows 32 bit machine

Run the application and setup a local web server on port 80

Then login to your kali machine and then connect to local server setup on port 80 using kalis firefox

Try to capture POST http packets and examine it with the given scripts.

Install immunity debugger on windows machine and then run it as administrator.

Open the syncbreeze enterprise application and press F9 for execution ,observe the EIP register values.

Update the ip adress details with your machine IP

Run the 1-poc.py script using kali terminal or vscode.

Check wheter the EIP register changed or not we wil observe that the syncbreeze application is stopped or crashed and you can see that the stack gets overflowed with A's.

After sucessful overflow now we have to know what characters are landing in EIP register.

msf-pattern_create -l 1000

Then enter the code in control_eip.py script and run the script again

usage :- control_eip.py <target_IP>

About

You Can Found Various Exploits that are used for practice and Gain experience on PenTesting Methodologies

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages