Author: Ivan Ricart Borges
Platform: Microsoft Windows
IDE: DEV-C ver-4.9.9.2
Compiler: MinGW
Dependences: Libwsock32.a
Version: 2.5
Project: https://github.com/iricartb/buffer-overflow-vulnerability-services-tester-tool
Mail: [email protected]
Linkedin: https://www.linkedin.com/in/ivan-ricart-borges
PDF version: BOVSTT
1. DETAILED OVERVIEW
Program to detect the existence of remote / local stack-based buffer-overflow vulnerabilities using the standard communication protocol for each service.
The application allows to customize the testing mechanism of each service through templates, these templates are simply plain text files, which accept some kind of special words (see STF section), these files are stored in the <services> folder with a direct association between the protocol and the template and with the extension STF (Service Tester File).
Currently the application version 2.5 supports the FTP, IMAP, POP3 and SMTP protocol.
To carry out this task the application allows to specify different types of parameters.
1.1 PARAMETERS
1.1.1 Aplication Layer Protocol
Description: Specifies the type of protocol to be tested.
Required: Yes
Options:
Read the rest of this story with a free account. Already have an account? Sign in
Author
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- LiveSeptember 5, 2024"40 Steps" Satellite Security - Registration for LIVE WORKSHOP IS NOW ON!
- LiveAugust 21, 2024"40 Steps" Game Hacking - Registration for LIVE WORKSHOP IS NOW ON!
- BlogDecember 13, 2022What are the Common Security Weaknesses of Cloud Based Networks?
- BlogOctober 12, 2022Vulnerability management with Wazuh open source XDR