Crashed CTF

1. Port Scanning

  • Unicornscan:

    sudo unicornscan -ImT 172.24.226.182:1-2000
  • Nmap:

    sudo nmap 172.24.226.182 -p 21 -sV -sC -Pn

2. FTP Brute Force

  • Metasploit:

    scanner/ftp/ftp_login
    set RHOSTS 172.24.226.182
    set USERPASS_FILE ftp.txt
  • Hydra:

    hydra -t 1 -l ftp -P pass.txt -vV 172.24.226.182 ftp

3. Enumeration

  • Get Service Files via FTP

  • Strings Analysis:

    strings super_secure_server.exe | less
  • Try to Find Running Service Port

4. Test for Buffer Overflow

  • Fuzzing:

  • Overwrite the EIP: Use Mona to find offset and generate payload accordingly.

  • Find Bad Characters: Generate a payload to find bad characters and adjust the pattern accordingly.

  • Find the Right Module: Use Mona to identify the module and the JMP ESP address.

  • Generate Shellcode:

  • Exploit: Update the Python script and initiate the exploit.

Last updated

Was this helpful?