all InfoSec news
Learn Buffer Overflow for OSCP- TryHackMe
InfoSec Write-ups - Medium infosecwriteups.com
(Room-OVERFLOW-1) Run our Immunity Debugger as Administrator and open the oscp.exe
Immunity Debugger — open oscp.exe
Click the red play button or we can go to Debug > Run. To check we can NC to target machine with port 1337.
nc <IP> 1337
Netcat to port 1337
Let’s configure our mona and set it to current directory.
!mona config -set workingfolder c:\\mona\\%p
Fuzzing
The following Python script can be modified and used to fuzz remote entry points to an application. …
buffer buffer overflow check current debug debugger directory go to hacking immunity learn machine oscp overflow play port run target tryhackme walkthrough