aluigi wrote:
thank you very much for your fast help!!! Sorry, but I have to ask you one more thing because I am a real big NoOb in that things!!! I use it the first time!!!
--> I was able to open it, like you show in this Video!!!
In the cmd stand:
Usage: mohaabof <attack> [port(12203)]
Attack:
c = LAN clients buffer-overflow. It cannot work online because online is
used the Gamespy protocol that is not affected by this bug
s = server buffer-overflow: you can test this PoC versus a specific server.
You must add the IP or the hostname of the server after the 's'.
The PoC first tests the overflow for Win32 servers and then for Linux
that requires more data for overwriting the return address
Some usage examples:
mohaabof c listens on port 12203 for clients
mohaabof c 1234 listens on port 1234
mohaabof s 192.168.0.1 tests the server 192.168.0.1 on port 12203
mohaabof s 192.168.0.1 1234 tests the server 192.168.0.1 on port 1234-->So I wrote: mohaabof s 83.20.99.159 (For an Internet server with the port 12203!)
BUT it wrote:
- Target 83.20.99.159:12203
- Request informations
Error: socket timeout, probably the server is not online
???WHY because it is definitely online and the Target is the right one??????
Please help me!!!! Nice day!!!!