OSCP Buffer Overflow in 30 minutes
The scripts are a bit rough (and are Python 2) but if you've read Justin Steven's guide, it should all make sense.
- Start by modifying
constants.pyto include the
PORTof the machine you are attacking.
- You will also need to modify
send_payload()so that the payload is properly sent to the vulnerable service; the example
send_payload()interacts with an FTP server with the overflow in the password field.
- Run the scripts in order, following the prompts and comments.