💻
oscp-study-notes
  • What is this?
  • Scanning & Enumeration
    • FTP 21
    • SMTP 25
    • HTTP/HTTPS 80/443/*
    • SMB 139/443
  • Vulnerabilites & Exploitation
    • Socket Programming
    • Generate shellcodes
    • Shellshock
    • Cross Compiling
    • LFI/RFI
    • SQL Injection
    • CVE2009-3103
    • MS17-010
  • Privilege Escalation
  • File Transfers
  • Buffer Overflow
  • Port Redirection and Tunneling
  • Password Cracking
  • Proof
  • Netcat
  • Third-party Tools
  • Bypass AV
  • Methodology
  • Writing a report
  • Further Reading
Powered by GitBook
On this page
  • Linux
  • Windows
  • Immunity Debugger
  • Useful commands
  • Generate debruijn/cyclic pattern
  • Find pattern offset
  • Assemble code
  • References

Was this helpful?

Buffer Overflow

Linux

Windows

Immunity Debugger

Get modules information

!mona

Useful commands

Generate debruijn/cyclic pattern

ragg2 -P 100 -r

Find pattern offset

ragg2 -q 0x42414141

Assemble code

rasm2 -a x86 -C 'add esp, -1500'

References

PreviousFile TransfersNextPort Redirection and Tunneling

Last updated 5 years ago

Was this helpful?

https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/