4. Fuzzing
The following Python script can be modified and used to fuzz remote entry points to an application. It will send increasingly long buffer strings in the hope that one eventually crashes the application.
Note that, we need to change send
command to the command that we spiked and its format will be identified by seeing the EAX
register in the previous step (spiking). Also add or remove recv
commands according to the messages that the commands send
Finally run this script and check that the EIP register has been overwritten by A's (\x41). Make a note of any other registers that have either been overwritten, or are pointing to space in memory which has been overwritten.
Last updated