Maybe it would be worth to mention that under Windows 2003 SP1+ the exploit works only if ‘vulnserver.exe’ is opt-out from DEP or DEP is set to ALWAYSOFF otherwise it will simply fail the execution with an ACCESS VIOLATION due to the fact that the memory space where we inject our shellcode is not marked as executable. Btw, great tutorials. Very clean and well explained. What about tutorials on exploit writing (gdb and OS/compiler protections bypass) for Linux as well? Keep up the good work!
ah yes – that’s true. I already had my system set in optout mode (in order to prepare for article 6), which is why the exploit worked on SP1+. By the way : article 6 deals with OS/compiler protections 🙂 You’ll find the same vulnerable code/exploit back in that article, with the explanation on how to bypass DEP (and other protection mechanisms).. If you liked the tutorial series until know, then I’m pretty sure you will like part 6 too. With regards to Linux : I’ll think about it… thanks for you kind feedback !
I read part 6 as well, great work, thanks. I meant a series of tutorial for Linux (or Unix in general) as well would be great.
Hi, i am unable run the perl codes in the cmd, i get this as a result: C:\Documents and Settings\Administrator>”C:\Documents and Settings\Administrator \Desktop\tut4.pl” [+] Setting up socket [+] Connecting to localhost on port 200 connect: No connection could be made because the target machine actively refused it. at C:\Documents and Settings\Administrator\Desktop\tut4.pl line 19. which is this:connect(SOCKET, $paddr) or die “connect: $!”; PLEASE HELP!!!!!!!!!!!!!!!!!!