Bypassing ASLR by brute force memory address
This is a demo how to bypass ASLR by brute forcing the memory bytes that is changing everytime you run your application. By doing that, you can keep trying all the possible bytes until you hit the right byte to jump to it.
1- Compile the time service c file and run it with your choice of port to listen to. Run it on Ubuntu 32 bit.
2- Run the python file against your ubuntu server and change the IP inside the exploit file to match your time server IP.
Have fun :)