2. Fuzzing
Fuzzing
xfreerdp /u:admin /p:password /cert:ignore /v:10.10.213.94
Once we find a vulnerable part with Spiking, we are going to use fuzzing. Fuzzing is to send a bunch of characters to the program to see if we can break it.
On your Kali box, connect to port 1337 on MACHINE_IP using netcat:
Mona Configuration
The mona script has been preinstalled, however to make it easier to work with, you should configure a working folder using the following command, which you can run in the command input box at the bottom of the Immunity Debugger window:
fuzzer.py
Run the fuzzer . py script using python: python fuzzer.py
The fuzzer will send increasingly long strings comprised of As (up to 3000). If the fuzzer crashes the server with one of the strings, you should see an error like: "Could not connect to MACHINE_IP:1337". Make a note of the largest number of bytes that were sent.
Last updated
Was this helpful?