OSCE icon indicating copy to clipboard operation
OSCE copied to clipboard

Some exploits, which I’ve created during my OSCE preparation.

#+Title: OSCE #+Author: Dennis Herrmann

Some [exploits|tools|templates], which I've created during my OSCE preparation.

** Exploits

| Software | Version | Type | |--------------------------------------+---------+--------| | Easy File Sharing Web Server | 7.2 | Remote | | KarjaSoft Sami FTP Server | 2.0.1 | Remote | | Ultra Mini Httpd Program (minihttpd) | 1.2 | Remote | | VulnServer TRUN - DEP Bypass | - | Remote | | VulnServer KSTET - Egghunter | - | Remote | | Free Float FTP Server | 1.0 | Remote | | Dup Scout Enterprise | 10.0.18 | Remote | | LabF nfsAxe FTP Client | 3.7 | Remote | | Easy Chat Server | 3.1 | Remote | | MinaliC Webserver | 2.0.0 | Remote | | KnFTP Server | 1.0.0 | Remote | | ProSysInfo TFTP Server | 0.4.2 | Remote | | Light HTTPD | 0.1 | Remote | | Easy CD DVD Copy | 1.3.24 | Local | | R | 3.4.4 | Local | | Audiograbber | 1.8.3 | Local |

** Templates

#+BEGIN_SRC shell $ tree ├── local │ ├── template_class_exploit.py │ └── template_exploit.py └── remote ├── ftp │ ├── client │ │ └── template_exploit.py │ └── server │ └── template_exploit.py ├── http │ ├── template_class_exploit.py │ └── template_exploit.py └── tftp └── template_exploit.py #+END_SRC

** Tools

| Name | Description | |-------------------+-------------------------------------------------| | egghunter.py | Generate an egghunter with a new Signature | | disassemble.py | Disassembly shellcode with capstone | | bin2op.py | Extract the opcode from the objdump of a binary | | port-converter.py | Convert a port/ip addr to the network order |