Tool
XP : WarFtp, OllyDbg,
BT5 : NetCat, Fuzzer
Practicing fuzzing and buffer overflow using run warftp on client and sending abnormal data from fuzzer.
WarFtp |
To activated WarFtp by clicking in tabs menu properties--> start service. In the attacker (BT5) using nc to request the connection.
Running NC |
NC is already running the connection, now its time to make a fuzzer by using nano editor, this fuzzer is python language.
Fuzzer |
Next, we will to execute the fuzzer, this fuzzer will sending the carracters "A" with 1000byte to WarFtp.
Before Execute Fuzzer |
After Execute Fuzzer |
After execute the fuzzer, application warftp was clossed. Its crash on the system wi will find the error. After the applications cloose lets run again this application if you are find windows notification about the error and usually windows request to sending the error to microsoft. Unfortunally i have not got the error, but we try to edit the fuzzer agains.
Other Fuzzer |
I will try some fuzzer by edited the fuzzer code, have many kinds code to try this fuzzer to get the error message from warFtp... Unfortunally against i have not got the error. But we know the application was clossed after we execute the fuzzer. We will ceck the memory registers using Olly Debuger.
OllyDbg |
We known the EIP registers from warftp, and the carrachters A and Z have value 1.
EIP Register |
The EIP register not found the error....
I will try againts in the part 2... I will learn more and try harder to get error.
0 comments:
Post a Comment