Introduction
Last updated
Last updated
Spiking (Find a vulnerable part of a program)
Fuzzing (Send a bunch of characters to the program and see if we can break it)
Finding the offset (Find the exact part that our program is breaking)
Overwrite the EIP (Set what next instruction is executed)
Finding the right module to jump to ESP
Finding bad characters (Avoid that our exploitation breaks the program)
Generating Shellcode (Create malicious code to be executed in program)
Be inside!!
Download here: https://debugger.immunityinc.com/ID_register.py
Install it
Open it as Administrator
Menu part:
File
Attach (or Ctrl + F1)
Select the process to attach
Clic on Attach
Bottom right part, we see Paused, clic menu in button. Now bottom we se Running.
That's it