Giter Site home page Giter Site logo

bofman's Introduction

tool to assist in development and testing of simple x86 network based buffer overflow exploits

use --help for instructions

default shellcode is an unstaged msfvenom generated payload for a bind shell on port 4444 (windowsx86)

NOTE: IF 0x00 IS A BAD CHAR, DO NOT USE the --SUB_ESP option with the EXPLOIT sub-command, INSTEAD USE NASM_SHELL AND DIRECTLY ADD YOUR STACK ADJUST TO THE SHELLCODE.BIN file using a binary file editor of your choice

to be added: improve cli

to see real word useage examples, look in the notes.txt files in my tryharder repo

How to Use:-

  1. git clone
  2. ./main.py --help

Optionally, you can softlink main.py to your /usr/bin as "bofman" (or anything you like) for a systemwide install, just make sure you update default.conf to point to your pattern file and copy it to the same dir as the softlink.

Examples:-

  1. features
usage: bofman [-h] {test,exploit,q} ...

investigate and exploit buffer overflows

positional arguments:
  {test,exploit,q}  sub command help
    test            options for test
    exploit         options for exploit
    q               query for offsets

optional arguments:
  -h, --help        show this help message and exit
  1. test
usage: bofman test [-h] [--len LEN] [--offset OFFSET] [--buffer-type {a,pattern,confirm,badchars}] [--command COMMAND] [-b B] [--post_command POST_COMMAND] [--stdout]      
                  ip port                                                                                                                                                  
                                                                                                                                                                           
positional arguments:                                                                                                                                                       
 ip                    ip of remote target                                                                                                                                 
 port                  remote port                                                                                                                                         

optional arguments:
 -h, --help            show this help message and exit
 --len LEN             size of buffer to send
 --offset OFFSET       offset to confirm
 --buffer-type {a,pattern,confirm,badchars}
                       type of buffer to send
 --command COMMAND     server command to prepend buffer with
 -b B                  badchars to exclude from buffer seperated by commas (in integer form)
 --post_command POST_COMMAND
                       server command to append buffer with (remember to escape backslashes)
 --stdout              send buffer to stdout instead of socket
  1. exploit
usage: bofman exploit [-h] --len LEN --offsetEIP OFFSETEIP --eip EIP --shellcode SHELLCODE --shellcodeOffset SHELLCODEOFFSET [--sub_esp SUB_ESP] [--nops NOPS]
                      [--command COMMAND] [--post_command POST_COMMAND] [--stdout]
                      ip port

positional arguments:
  ip                    ip of remote target
  port                  remote port

optional arguments:
  -h, --help            show this help message and exit
  --len LEN             size of buffer to send
  --offsetEIP OFFSETEIP
                        how many bytes to write before EIP
  --eip EIP             memory location to overwrite EIP
  --shellcode SHELLCODE
                        path to shellcode in raw binary form
  --shellcodeOffset SHELLCODEOFFSET
                        offset to begin shellcode
  --sub_esp SUB_ESP     integer value to (1-9) of how many kilobytes to subtract from ESP
  --nops NOPS           number of nops to place before shellcode
  --command COMMAND     server command to prepend buffer with
  --post_command POST_COMMAND
                        server command to append buffer with (remember to escape backslashes)
  --stdout              send buffer to stdout instead of socke

bofman's People

Contributors

arnv0 avatar

Stargazers

Dallas Moore avatar Matthew Linney avatar Pranav Sharma avatar  avatar Doublethink avatar Ankur Tyagi avatar yugen-sec avatar  avatar

Watchers

 avatar

Forkers

mvandewouw

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.