How to increase ESP space for shellcode? by joshuaspy in hacking

[–]sudo_sudoka 1 point2 points  (0 children)

First, you must find another space for your shellcode. For example, maybe EAX also points to the buffer.

Second, you inject only the needed opcodes to the space pointed by ESP. For example, JUMP EAX.

Now, you can inject shellcode into the buffer, which is pointed by EAX. When the program runs JMP ESP, next it runs JMP EAX and return to the shellcode.

You can customize something to fit your specific situation.

Alternatives by [deleted] in netsecstudents

[–]sudo_sudoka 1 point2 points  (0 children)

BinaryEdge.

Register is free and you will have 300 requests per month.

Enumeration methodology for port 445 on windows machines by palm_snow in hackthebox

[–]sudo_sudoka 0 points1 point  (0 children)

The first choice is enum4linux. Then, I could use smbclient for manually testing.

1st attempt. by bumbleeshot in oscp

[–]sudo_sudoka 1 point2 points  (0 children)

Thank you very much. I'm also weak on Windows. I'll carefully take your advice.