Skip to content

Instantly share code, notes, and snippets.

@BraveLittleRoaster
Created October 25, 2016 07:46
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save BraveLittleRoaster/d85c3500b74b6080a596782bb4c7c297 to your computer and use it in GitHub Desktop.
Save BraveLittleRoaster/d85c3500b74b6080a596782bb4c7c297 to your computer and use it in GitHub Desktop.
vulnserver.exe fuzzer.
#!/user/bin/python
import socket
# Fuzzes input \x41\ up to 6000 bytes.
buffer = ["A"]
counter = 100
cmd_list = ["STATS ", "RTIME ", "LTIME ", "SRUN ", "TRUN ", "GMON ",
"GDOG ", "KSTET ", "GTER ", "HTER ", "LTER ", "KSTAN "]
while len(buffer) <= 30:
buffer.append("A"*counter)
counter = counter + 200
for cmd in cmd_list:
for string in buffer:
print "Fuzzing command %s with %s bytes" % (cmd, len(string))
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
connect = s.connect(('10.1.5.40', 80))
s.recv(1024)
s.send(cmd+string)
s.close()
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment