Comment on page
Introduction (Steps)
- 1.Spiking (Find a vulnerable part of a program)
- 2.Fuzzing (Send a bunch of characters to program and see if we can break it)
- 3.Finding the offset (Find the exact part that our program is breaking)
- 4.Overwrite the EIP (To set what next instruction is executed)
- 5.Finding bad characters (To avoid our exploitation gonna break)
- 6.Finding the right module (?)
- 7.Generating Shellcode (Create malicious code to be executed in program)
- 8.Be inside!!
- 1.
- 2.Install it
- 3.Open it as Administrator
- 4.Menu part:
- 1.File
- 2.Attach (or Ctrl + F1)
- 3.Select the process to attach
- 4.Clic on Attach
- 5.Bottom right part, we see Paused, clic menu inbutton. Now bottom we se Running.▶
- 6.That's it
Last modified 4mo ago