Name:- Patil Bhumi Sanjay
Class:- B.E. (A)
Subject:- Cyber Security Lab
Roll No:- 75
Aim: Study of Vulnerability Analysis Tools in Kali Linux.
Fuzzing Tools: BED
BED is a program designed to check daemons for potential buffer overflows, format strings, et. al.
bed -s HTTP -t 172.16.0.7
BED stands for Bruteforce Exploit Detector. It is designed to check daemons for potential buffer overflows, format strings et. al.
Author: mjm, eric
License: GPLv2
bed – A network protocol fuzzer
root@kali:~# bed
BED 0.5 by mjm ( www.codito.de ) & eric ( www.snake-basket.de )
Usage:
./bed.pl -s <plugin> -t <target> -p <port> -o <timeout> [ depends on the plugin ]
<plugin> = FTP/SMTP/POP/HTTP/IRC/IMAP/PJL/LPD/FINGER/SOCKS4/SOCKS5
<target> = Host to check (default: localhost)
<port> = Port to connect to (default: standard port)
<timeout> = seconds to wait after each test (default: 2 seconds)
use "./bed.pl -s <plugin>" to obtain the parameters you need for the plugin.
Only -s is a mandatory switch.
Use the HTTP plugin (-s HTTP) to fuzz the target server (-t 192.168.1.15):
root@kali:~# bed -s HTTP -t 192.168.1.15
BED 0.5 by mjm ( www.codito.de ) & eric ( www.snake-basket.de )
+ Buffer overflow testing:
testing: 1 HEAD XAXAX HTTP/1.0
References:
1. https://tools.kali.org/vulnerability-analysis/bed
2. https://www.tutorialspoint.com/kali_linux/index.htm
sites.google.com/view/patilbhumisanjay-home/cyber-security-lab/experiment-no-4