Crashed CTF
1. Port Scanning
Unicornscan:
sudo unicornscan -ImT 172.24.226.182:1-2000Nmap:
sudo nmap 172.24.226.182 -p 21 -sV -sC -Pn
2. FTP Brute Force
Metasploit:
scanner/ftp/ftp_login set RHOSTS 172.24.226.182 set USERPASS_FILE ftp.txtHydra:
hydra -t 1 -l ftp -P pass.txt -vV 172.24.226.182 ftp
3. Enumeration
Get Service Files via FTP
Strings Analysis:
strings super_secure_server.exe | lessTry to Find Running Service Port
4. Test for Buffer Overflow
Fuzzing:
Overwrite the EIP: Use Mona to find offset and generate payload accordingly.
Find Bad Characters: Generate a payload to find bad characters and adjust the pattern accordingly.
Find the Right Module: Use Mona to identify the module and the JMP ESP address.
Generate Shellcode:
Exploit: Update the Python script and initiate the exploit.
Last updated
Was this helpful?