/OSCP-Buffer-Overflow-in-30-minutes

OSCP Buffer Overflow in 30 minutes

Primary LanguagePython

OSCP Buffer Overflow in 30 minutes

The scripts are based on 21y4d's work with additional automation and improvements lifted from Justin Steven's fantastic dostackbufferoverflowgood tutorial — props to them.

The scripts are a bit rough (and are Python 2) but if you've read Justin Steven's guide, it should all make sense.

  1. Start by modifying constants.py to include the HOSTNAME and PORT of the machine you are attacking.
  2. You will also need to modify send_payload() so that the payload is properly sent to the vulnerable service; the example send_payload() interacts with an FTP server with the overflow in the password field.
  3. Run the scripts in order, following the prompts and comments.