Nmap scan results →

Host is up (0.050s latency).          
Not shown: 65524 closed ports                                                                            
PORT      STATE SERVICE            VERSION
135/tcp   open  msrpc              Microsoft Windows RPC
139/tcp   open  netbios-ssn        Microsoft Windows netbios-ssn                                         
445/tcp   open  microsoft-ds       Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3389/tcp  open  ssl/ms-wbt-server?
|_ssl-date: 2020-07-15T16:55:43+00:00; -1s from scanner time.                                            
31337/tcp open  Elite?                                                                                   
| fingerprint-strings:                                                                                   
|   FourOhFourRequest:                   
|     Hello GET /nice%20ports%2C/Tri%6Eity.txt%2ebak HTTP/1.0
|     Hello                                                                                              
|   GenericLines:                                                                                        
|     Hello                                                                                              
|     Hello                                                                                              
|   GetRequest:                                                                                          
|     Hello GET / HTTP/1.0                                                                                                                                                                                        
|     Hello                                                                                              
|   HTTPOptions:                                                                                         
|     Hello OPTIONS / HTTP/1.0                                                                           
|     Hello                                                                                              
|   Help:                                                                                                
|     Hello HELP                                                                                         
|   Kerberos:                                                                                            
|     Hello !!!                                                                                          
|   LDAPSearchReq:                                                                                       
|     Hello 0                                                                                            
|     Hello                                                                                              
|   LPDString:                                                                                           
|     Hello
|     Hello                                                                                                                                                                                                [55/88]
|     Hello                                                                                              
|   GetRequest:                                                                                          
|     Hello GET / HTTP/1.0                                                                                                                                                                                        
|     Hello                                                                                              
|   HTTPOptions:                                                                                         
|     Hello OPTIONS / HTTP/1.0                                                                           
|     Hello                                                                                              
|   Help:                                                                                                
|     Hello HELP                                                                                         
|   Kerberos:                                                                                            
|     Hello !!!                                                                                          
|   LDAPSearchReq:                                                                                       
|     Hello 0                                                                                            
|     Hello                                                                                              
|   LPDString:                                                                                           
|     Hello                                                                                              
|     default!!!                                                                                         
|   RTSPRequest:                                                                                         
|     Hello OPTIONS / RTSP/1.0
|     Hello
|   SIPOptions: 
|     Hello OPTIONS sip:nm SIP/2.0
|     Hello Via: SIP/2.0/TCP nm;branch=foo
|     Hello From: <sip:nm@nm>;tag=root
|     Hello To: <sip:nm2@nm2>
|     Hello Call-ID: 50000
|     Hello CSeq: 42 OPTIONS
|     Hello Max-Forwards: 70
|     Hello Content-Length: 0
|     Hello Contact: <sip:nm@nm>
|     Hello Accept: application/sdp
|     Hello
|   SSLSessionReq, TLSSessionReq, TerminalServerCookie: 
|_    Hello
49152/tcp open  msrpc              Microsoft Windows RPC
49153/tcp open  msrpc              Microsoft Windows RPC
49154/tcp open  msrpc              Microsoft Windows RPC
49160/tcp open  msrpc              Microsoft Windows RPC
49161/tcp open  msrpc              Microsoft Windows RPC
49162/tcp open  msrpc              Microsoft Windows RPC

So while perusing through there Smb share we find a exe file and i transfered it over my Windows machine and attached it to my Immunity Debbugger and connected to my vm at port 31337

and i sent it a normal output ("nickapic") at first which resulted in saying hello nickapic and then i sent 5000 A's and the application crashed with the EIP 41414141 which stands for 4 A's and then i created a pattern using mona

!mona pc 5000

and then our application crashed again with its EIP at 39654138 and when we check that with pattern offset it comes out to be a offset of 146. So lets make a script and confirm that we can overwrite the EIP with this offset and we send 146A's and 4B's we have our EIP overwritten by 42424242 which is Hexa for B. So now lets test out for bad characters and see if there is an issue with that

\x00\x0A

080414C3

\xc3\x14\x04\x08