Penetration Testing mailing list archives
Net:telnet exploit
From: "Gary O'leary-Steele" <garyo () sec-1 com>
Date: Sun, 23 Mar 2003 11:36:34 -0000
Hello all, I am coding an exploit using perl. The exploit needs to send each byte individually instead of a large string to get round some trivial bounds checking. use Net::Telnet (); $t->open(Host=> $host, Port => $port, Errmode => $mode, Timeout => $secs,); $t ->put("\xFF"); However when I send \xFF bytes they get doubled up. Any ideas? Regards, Gary ---------------------------------------------------------------------------- Did you know that you have VNC running on your network? Your hacker does. Plug your security holes now! Download a free 15-day trial of VAM: http://www2.stillsecure.com/download/sf_vuln_list.html
Current thread:
- Net:telnet exploit Gary O'leary-Steele (Mar 24)
- Re: Net:telnet exploit Dave Aitel (Mar 24)
- Re: Net:telnet exploit Gerardo Richarte (Mar 26)
- Re: Net:telnet exploit Dave Aitel (Mar 24)