2- Fuzzing
Fuzzing: We are going to be sending a bunch of characters at a specific command and trying to break it. The different is, with spiking we're trying to do that to multiple commands to try to find what's vulnerable.
Now we know that the TRUN command is vulnerable, we're going to go ahead and attack that command specifically.
We need a built up the python script that we're going to use to Fuzz.
Once we run the payload, keep notice that, at one point the Immunity debug will blink and alert Access Violation.
Once, the program crashed, we can go back to Kali machine and hit Ctrl + C. We found that program crashed somewhere around 2000 bytes.
Last updated