Damn! I can almost done all the exercise, but at the end, can´t connect to 4455. The last exploit excecutes (the one with the sheellcode) but does nothing! I cant reach the reverse shell
Hey... Suppose we are attacking a remote windows server we dont have access to. Anyway you can remotely tell if the stack has been over written .. And if the EIP has been over written successfully.
One way is by crashing the application but the exploit are developed in a sandbox environment for specific version of application, then used against the target.
ok nvm sir. for those out there, dont forget to press the play button in ur immunity debugger if nothing comes out. just realised theres a breakpoint automatically set.
Dude please continue what you're doing, please make a video on how to start with exploit writing. Had enough of buffer overflow
Thank you man, that's exactly what I needed. Very clearly explained and well demoed. Thumbs-up.
Best Explanation i have got on youtube. keeo it up..
Nice video🔥!You deserve more subs!
You do great work... I'm loving your tutorials... Keep it up 😇😇
Great tutorial...keep posting these...also please make some tutorial on finding bufferoverflow in gui apps aswell
Thanks for the detail explanation
great video dude super educational
Lifesaver - great tutorial.
your very EXCELLENT
Top!! Cheers!
One question, what version of the cloud me and windows you're using for this example? Thank you!
🔥🔥🔥🔥please make lot video sir
Nice Channel 🎉
Nice video
Super bro
Hi, can I know based on what you choose this port? Is there rule?
What you do at 15:14?
Is the red shellcode the bufferstart,or what is it and how you generate it.
it's a hex format of 688dd4ed in reverse. see from 14:01
Damn! I can almost done all the exercise, but at the end, can´t connect to 4455. The last exploit excecutes (the one with the sheellcode) but does nothing! I cant reach the reverse shell
I get a connection refused msg... not sure whats wrong. :/
I run all the script and get till the end but instead of getting access to the application, the application closes, whys this could be happening?
Hey...
Suppose we are attacking a remote windows server we dont have access to.
Anyway you can remotely tell if the stack has been over written ..
And if the EIP has been over written successfully.
One way is by crashing the application but the exploit are developed in a sandbox environment for specific version of application, then used against the target.
What version of Cloud Me are you using?
1.7.1
How did you come to know which port is being used by the application?
it's a default port for cloudme.
Does Windows Defender catch it as a virus?
I would disable it.
Hi sir. I run the exploit.py but nothing happened. i followed the steps and have correct cloudme 1.7.1. waht happened.
ok nvm sir. for those out there, dont forget to press the play button in ur immunity debugger if nothing comes out. just realised theres a breakpoint automatically set.
牛比