-
-
Save BraveLittleRoaster/d85c3500b74b6080a596782bb4c7c297 to your computer and use it in GitHub Desktop.
vulnserver.exe fuzzer.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/user/bin/python | |
import socket | |
# Fuzzes input \x41\ up to 6000 bytes. | |
buffer = ["A"] | |
counter = 100 | |
cmd_list = ["STATS ", "RTIME ", "LTIME ", "SRUN ", "TRUN ", "GMON ", | |
"GDOG ", "KSTET ", "GTER ", "HTER ", "LTER ", "KSTAN "] | |
while len(buffer) <= 30: | |
buffer.append("A"*counter) | |
counter = counter + 200 | |
for cmd in cmd_list: | |
for string in buffer: | |
print "Fuzzing command %s with %s bytes" % (cmd, len(string)) | |
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) | |
connect = s.connect(('10.1.5.40', 80)) | |
s.recv(1024) | |
s.send(cmd+string) | |
s.close() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment