Beginner Buffer Overflow - Exploiting Dup Scout Enterprise 10.0.18

Channel:
Subscribers:
3,600
Published on ● Video Link: https://www.youtube.com/watch?v=tqkDQE9Lqrg



Duration: 0:00
390 views
15


In this video, we go step-by-step through exploiting a stack buffer overflow in an old version of Dup Scout Enterprise.

The video covers:

✅ How to set up and install the vulnerable software.
✅ Using Burp Suite to fuzz web requests and uncover vulnerabilities.
✅ Analyzing crashes to overwrite the return address.
✅ Debugging the process with WinDbg to find exploitable flaws.
✅ Writing a Python exploit proof-of-concept to demonstrate the vulnerability.

This is a great beginning friendly video for learning how to exploit Windows applications!

📖 Resources
Blogs I've written on basic Windows exploit https://www.jasonturley.xyz/blog/windows-exploit-development/nd...
Exploit chttps://gist.github.com/JasonTurley/999ca242c449784c22b097466ba39e9d/9...
Mona (exploit development thttps://github.com/corelan/mona/mona
WinDbghttps://github.com/corelan/windbglibbglib

Timestamps
00:00 Intro
02:56 Installing and running the vulnerable application
07:00 Fuzzing the username parameter
10:12 Analyzing the application crash
13:37 Finding offset to the return address
18:50 Examining the binary's security mitigations
20:48 Debugging this bad boy in WinDbg
34:38 Overwriting the return address with a jump instruction
42:15 Crafting shellcode
44:50 Troubleshooting exploit and questioning life choices
46:50 Fixing the exploit and winning at life