Skip to content

Use exploit scripts

lethanhtung01011980 edited this page Jan 10, 2020 · 9 revisions

Search exploits

Search file

  • locate /42031.py

Modify exploits

  • Modify IP
  • Modify return address
  • Modify shell code

Compile exploits

Exploits in Linux C

  • gcc 643.c -o 643
  • Note that string is 1 character longer than memset and malloc.
  • May need extra libraries for IPs and sockets image

Exploits in Windows C

  • Install mingw-w64: apt-get install mingw-w64
  • Compile: i686-w64-mingw32-gcc 646-fixed.c -lws2_32 -o 646.exe

Compile python to C

Run expoits

  • Linux C program: ./643
  • Windows C program: wine 646.exe victim_ip

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally