Posts

Showing posts from August, 2015

Walkthrough Tr0ll 2 VM (Vulnhub)

Image
Tr0ll 2 vulnerable VM walkthrough.

1) Nmap scan:


EchoServer (Strcpy) bufferoverflow Securitytube Exploit research Megaprimer

Image
This blog is all about Exploit Research Video #3 form Pentester Academy/Security Tube. The exploit Research Megaprimer can be found on http://www.securitytube.net/groups?operation=view&groupId=7

Here I will be demonstrating buffer overflow on a strcpy or echo server that is written in c programming language by Vivek Ramachandran.

All you need to do is double click on the Server-strcpy.exe file to run the server.

Configuration/Setup: