HackThisSite Application 7 Solution Using In Memory Fuzzing

The post has moved. You can find the complete post in:

http://www.pigadas.com/blog/2008/11/28/hackthissite-application-7-solution-using-in-memory-fuzzing/

4 responses to “HackThisSite Application 7 Solution Using In Memory Fuzzing

  1. utwor June 24, 2010 at 5:35 pm

    Hi,

    I wanted to give a try at your solution but whenever I try to run it, the following error windows raises :

    app7win_imf.py, line167 in dbg.load('app7win_NOPed.exe')
    pydbg.py, line 2431, in load raise pdw(“CreatedProcess()”, True)
    pydbg.pdx.pdx: [2] CreatedProcess(): the specified file was not found

    Any hint about how to bypass it?

  2. zqyves October 1, 2010 at 7:03 am

    Hello utwor,

    The fuzzer expects a app7win.exe having NOPed the password entry point. Check the last two screen shots in order to see how I have done. Rename the resulting executable to app7win_NOPed.exe, put it in the same directory as the fuzzer and give it a try.

    ./Z

  3. narad April 8, 2011 at 4:03 pm

    dude can u explain wat to do after the last screenshot..??

  4. zqyves May 7, 2011 at 4:27 pm

    @narad nothing, just run the fuzzer and it will take care of the rest.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: