Posts

Showing posts from August, 2015

Walkthrough Tr0ll 2 VM (Vulnhub)

Image
Tr0ll 2 vulnerable VM walkthrough. 1) Nmap scan:

EchoServer (Strcpy) bufferoverflow Securitytube Exploit research Megaprimer

Image
       This blog is all about Exploit Research Video #3 form Pentester Academy/Security Tube. The exploit Research Megaprimer can be found on http://www.securitytube.net/groups?operation=view&groupId=7 Here I will be demonstrating buffer overflow on a strcpy or echo server that is written in c programming language by Vivek Ramachandran. All you need to do is double click on the Server-strcpy.exe file to run the server. Configuration/Setup: