Exploit Mini-Stream RM Mp3
after we make scrib save with py format, run the exploit WarFtp fuzzing as there will be a fileas below,
and run in windowsnya, then open the RM Mp3 via Ollydbg then run and then we can pull theinput file and place the result in the fuzzing RM Mp3
after that the results of such Ollydbg below
Next we create a script using the command: root @ bt :/ pentest / exploits / framework / tools #. / pattern_create.rb 3000 and the results are shown in the picture below
copy scribt and input into the file as shown in the picture below
then run the command again ordered a fuzzing as the previous run, and the results are shown in the picture below
then execute the command as shown below
then run back as psoser sebelunya fuzzing process that has been done and the results areas shown below
then make a return scribt simple as below
then run back as psoser sebelunya fuzzing process that has been done and the results areas shown below
run the application through OllyDbg on view menu and select Executable modules willlook like the view below
select a shell 32
then press ctrl f and type in JMP ESP as shown below
then the press will find out the results as shown below
bt at the console command to install the payload msfweb like the picture below
copy ip 127.0.0.1:55555 and open your browse
select payload and on the menu select windows filter modules select os ::win 32 and select windows bind shell he picture below
Fill in the fields we have to fill after we fill select Generate Payload and the results will looklike the picture below
copy scribt and input into the file as shown in the picture below
then run the command again ordered a fuzzing as the previous run, and the results areshown in the picture below
after the picture looks bleak at the top of our lives run telnet command as below
after telnet then there will be a process for a while we wait for some time and the results areas shown in the picture below
0 comments:
Post a Comment