Step 1: Fuzzing
AAAAAAAA
Restart vulnserver by pressing Ctrl+F2 in Immunity Debugger and then run it by pressing F9. Run the fuzzer to crash the executable's TRUN
command:
fuzzer.py
Here we should manually encode everything with b""
instead of using .encode()
since .encode()
turns a byte into its Unicode representation:
After a while, vulnserver crashes:
Here we learn that the offset is less than 3000 bytes. We only want to know an approximate value in this step, and we will figure out the exact offset in the next step.
Last updated