Skip to content

A Simple Buffer Overflow Exploit found on th SLMail Server's POP3 protocols. :)

Notifications You must be signed in to change notification settings

stormworm29/SLMail_BufferOverFlow_Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

This is a simple BufferOverflow exploit found on a SlMail server using pop3 protocol.

The other files includes the various stages of exploits.

Intially the "bof_fuzzer.py", helps to gradually locate the buffer length such that it could be exploited.

Then unique pattern can be generated with the metasploit module "pattern_create.rb", the pattern generated with it is used to find the exact position of the input length which is placed at the EIP pointer :)

Using debuggers the pattern in side the EIP is identified and the position is identified using the "pattern_offset.rb" module in metasploit.

with the position of the input location and EIP. Now its easy to exploit it.

now the list of bad characters is identified with the help of the "bof_poc2.py" which is a very simple python script ;). and further refined with the "bof_poc3.py"

Now is final phase where the exac dll must be identified. For which the mona.py modules can be used.And the jmp address is noted for the corresponding address in nasn_shell.reb

then a simple exploit is built using the msfvenom to add the payload with reverse shell.

now this gives the final exploit "slmailexploit.py"

Link fo the Vulnerable SLMail Server:

https://www.exploit-db.com/exploits/638/

For Output snips You can refer my blog at https://computer-lords.blogspot.in/2018/04/first-bufferoverflow-exploit.html

Happy Hacking :)

About

A Simple Buffer Overflow Exploit found on th SLMail Server's POP3 protocols. :)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages