EXPLOIT VU-PLAYER
open your aplikasi Vu player
open via Ollydbg as picture below
result
first we create a simple script like the picture below
Next we create a script using the command: root @ bt :/ pentest / exploits / framework / tools #. / pattern_create.rb 3000 and the results are shown in the picture below
copy scribt and input into the file as shown in the picture below
then run the command again ordered a fuzzing as the previous run, and the results are shown in the picture below
then execute the command as shown below
make scribt as below
then run back as psoser sebelunya fuzzing process that has been done and the results areas shown below
then make a return scribt simple as below
then run back as psoser sebelunya fuzzing process that has been done and the results areas shown below
run the application through OllyDbg on view menu and select Executable modules willlook like the view below
select a shell 32
then press ctrl f and type in JMP ESP as shown below
then the press will find out the results as shown below
bt at the console command to install the payload msfweb like the picture below
copy ip 127.0.0.1:55555 and open your browse
select payload and on the menu select windows filter modules select os ::win 32 and select windows bind shell he picture below
Fill in the fields we have to fill after we fill select Generate Payload and the results will looklike the picture below
copy scribt and input into the file as shown in the picture below
fuzzer run back but now without Ollydbg
jalankan kembali fuzzer setelah itu lakukan telnet 192.168.56.101 4444
explotl sucses
open via Ollydbg as picture below
result
first we create a simple script like the picture below
fuzzer run as in the previous application steps
after that the results of such Ollydbg belowNext we create a script using the command: root @ bt :/ pentest / exploits / framework / tools #. / pattern_create.rb 3000 and the results are shown in the picture below
copy scribt and input into the file as shown in the picture below
then run the command again ordered a fuzzing as the previous run, and the results are shown in the picture below
then execute the command as shown below
make scribt as below
then run back as psoser sebelunya fuzzing process that has been done and the results areas shown below
then make a return scribt simple as below
then run back as psoser sebelunya fuzzing process that has been done and the results areas shown below
run the application through OllyDbg on view menu and select Executable modules willlook like the view below
select a shell 32
then press ctrl f and type in JMP ESP as shown below
then the press will find out the results as shown below
bt at the console command to install the payload msfweb like the picture below
copy ip 127.0.0.1:55555 and open your browse
select payload and on the menu select windows filter modules select os ::win 32 and select windows bind shell he picture below
Fill in the fields we have to fill after we fill select Generate Payload and the results will looklike the picture below
copy scribt and input into the file as shown in the picture below
fuzzer run back but now without Ollydbg
jalankan kembali fuzzer setelah itu lakukan telnet 192.168.56.101 4444
explotl sucses
0 comments:
Post a Comment