Skip to content
OSCP Buffer Overflow in 30 minutes
Branch: master
Clone or download
Latest commit f354be3 Jun 12, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
1_fuzzer.py First version Jun 12, 2019
2_pattern.py First version Jun 12, 2019
3_badchars.py First version Jun 12, 2019
4_exploit.py First version Jun 12, 2019
README.md First version Jun 12, 2019
constants.py First version Jun 12, 2019

README.md

OSCP Buffer Overflow in 30 minutes

The scripts are based on 21y4d's work with additional automation and improvements lifted from Justin Steven's fantastic dostackbufferoverflowgood tutorial — props to them.

The scripts are a bit rough (and are Python 2) but if you've read Justin Steven's guide, it should all make sense.

  1. Start by modifying constants.py to include the HOSTNAME and PORT of the machine you are attacking.
  2. You will also need to modify send_payload() so that the payload is properly sent to the vulnerable service; the example send_payload() interacts with an FTP server with the overflow in the password field.
  3. Run the scripts in order, following the prompts and comments.
You can’t perform that action at this time.