Penetration Testing mailing list archives
Net:telnet exploit
From: "Gary O'leary-Steele" <garyo () sec-1 com>
Date: Sun, 23 Mar 2003 11:36:34 -0000
Hello all,
I am coding an exploit using perl. The exploit needs to send each byte
individually instead of a large string to get round some trivial bounds
checking.
use Net::Telnet ();
$t->open(Host=> $host,
Port => $port,
Errmode => $mode,
Timeout => $secs,);
$t ->put("\xFF");
However when I send \xFF bytes they get doubled up.
Any ideas?
Regards,
Gary
----------------------------------------------------------------------------
Did you know that you have VNC running on your network?
Your hacker does. Plug your security holes now!
Download a free 15-day trial of VAM:
http://www2.stillsecure.com/download/sf_vuln_list.html
Current thread:
- Net:telnet exploit Gary O'leary-Steele (Mar 24)
- Re: Net:telnet exploit Dave Aitel (Mar 24)
- Re: Net:telnet exploit Gerardo Richarte (Mar 26)
- Re: Net:telnet exploit Dave Aitel (Mar 24)
