Tool Documentation:
bed Usage Example
Use the HTTP plugin (-s HTTP
) to fuzz the target server (-t 192.168.1.15
):
root@kali:~# bed -s HTTP -t 192.168.1.15
BED 0.5 by mjm ( www.codito.de ) & eric ( www.snake-basket.de )
+ Buffer overflow testing:
testing: 1 HEAD XAXAX HTTP/1.0
Packages and Binaries:
bed
BED is a program which is designed to check daemons for potential buffer overflows, format strings et. al.
Installed size: 73 KB
How to install: sudo apt install bed
Dependencies:
- perl
bed
root@kali:~# bed -h
BED 0.5 by mjm ( www.codito.de ) & eric ( www.snake-basket.de )
Usage:
bed -s <plugin> -t <target> -p <port> -o <timeout> [ depends on the plugin ]
<plugin> = FTP/SMTP/POP/HTTP/IRC/IMAP/PJL/LPD/FINGER/SOCKS4/SOCKS5
<target> = Host to check (default: localhost)
<port> = Port to connect to (default: standard port)
<timeout> = seconds to wait after each test (default: 2 seconds)
use "bed -s <plugin>" to obtain the parameters you need for the plugin.
Only -s is a mandatory switch.
Updated on: 2024-Mar-11