Introduction (Steps)
To deal with
Spiking (Find a vulnerable part of a program)
Fuzzing (Send a bunch of characters to program and see if we can break it)
Finding the offset (Find the exact part that our program is breaking)
Overwrite the EIP (To set what next instruction is executed)
Finding bad characters (To avoid our exploitation gonna break)
Finding the right module (?)
Generating Shellcode (Create malicious code to be executed in program)
Be inside!!
Attach tasks in Immunity Debugger
Download here: https://debugger.immunityinc.com/ID_register.py
Install it
Open it as Administrator
Menu part:
File
Attach (or Ctrl + F1)
Select the process to attach
Clic on Attach
Bottom right part, we see Paused, clic menu in ▶️ button. Now bottom we se Running.
That's it
Last updated