IMF Walkthrough (VulnHub)

แชร์
ฝัง

ความคิดเห็น • 6

  • @theepicpowner1
    @theepicpowner1 5 ปีที่แล้ว +1

    Amazing videos Jesse. Thank you for sharing your knowledge

  • @adityagupte5094
    @adityagupte5094 5 ปีที่แล้ว +4

    Good video! Can you explain the significance of "A" * 168 - len(buf) again?

    • @JesseKurrus
      @JesseKurrus  5 ปีที่แล้ว +1

      Yeah sure @Aditya Gupte. So, the "A" characters are just padding. Originally I threw 200 "A" characters at the binary and it crashed, then I calculated the offset at 168. That's where that number came from. Then I sent 168 "A" characters minus the length of the shellcode which provides that padding, add the CALL EAX address to instruct the binary to launch shellcode, and that gets the reverse shell connection initiated from IMF. Check out my Python script, it's pretty intuitive if you're familiar with scripting.
      github.com/jessekurrus/agentsploit/blob/master/agentsploit.py

    • @adityagupte5094
      @adityagupte5094 5 ปีที่แล้ว +1

      @@JesseKurrus Thanks a lot! I checked out your script and I understood it after carefully watching the video again. Great video and please keep up the good work by pwning more boxes.

    • @JesseKurrus
      @JesseKurrus  5 ปีที่แล้ว

      Thanks Aditya. I appreciate it.

  • @toolate6971
    @toolate6971 5 ปีที่แล้ว +2

    Rock On!!!