This document details the exploitation of a vulnerable Windows executable. We use a fuzzing script, analyze crashes, and inject shellcode.
We target vulnserver.exe, an intentionally vulnerable program for exploitation practice. Download from:
Run vulnserver.exe
on a Windows VM.
Attach Immunity Debugger to monitor crashes.
fuzz.py
)Run it:
Attach Immunity Debugger.
Identify EIP control (modify execution flow).
Inject custom shellcode (e.g., reverse shell).
Once EIP overwrite is confirmed, generate shellcode using msfvenom:
Modify exploit to inject shellcode and take control of execution.
Use DEP (Data Execution Prevention).
Implement ASLR (Address Space Layout Randomization).
Use stack canaries to detect buffer overflows.