BOVSTT - Buffer Overflow Vulnerability Services Tester Tool

Oct 23, 2017

Author: Ivan Ricart Borges
Platform: Microsoft Windows
IDE: DEV-C ver-4.9.9.2
Compiler: MinGW
Dependences: Libwsock32.a
Version: 2.5
Project: https://github.com/iricartb/buffer-overflow-vulnerability-services-tester-tool
Mail: [email protected]
Linkedin: https://www.linkedin.com/in/ivan-ricart-borges

PDF version: BOVSTT


1. DETAILED OVERVIEW

Program to detect the existence of remote / local stack-based buffer-overflow vulnerabilities using the standard communication protocol for each service.

The application allows to customize the testing mechanism of each service through templates, these templates are simply plain text files, which accept some kind of special words (see STF section), these files are stored in the <services> folder with a direct association between the protocol and the template and with the extension STF (Service Tester File).

Currently the application version 2.5 supports the FTP, IMAP, POP3 and SMTP protocol.

To carry out this task the application allows to specify different types of parameters.

1.1 PARAMETERS

1.1.1 Aplication Layer Protocol

Description: Specifies the type of protocol to be tested.

Required: Yes

Options:

Read the rest of this story with a free account.

Already have an account? Sign in

Author

Hakin9 TEAM
Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023