Introduction
Steps
Spiking (Find a vulnerable part of a program)
Fuzzing (Send a bunch of characters to the program and see if we can break it)
Finding the offset (Find the exact part that our program is breaking)
Overwrite the EIP (Set what next instruction is executed)
Finding the right module to jump to ESP
Finding bad characters (Avoid that our exploitation breaks the program)
Generating Shellcode (Create malicious code to be executed in program)
Be inside!!
Attach tasks in Immunity Debugger
Download here: https://debugger.immunityinc.com/ID_register.py
Install it
Open it as Administrator
Menu part:
File
Attach (or Ctrl + F1)
Select the process to attach
Clic on Attach
Bottom right part, we see Paused, clic menu in ▶️ button. Now bottom we se Running.
That's it
Last updated