Penetration Testing mailing list archives

Net:telnet exploit


From: "Gary O'leary-Steele" <garyo () sec-1 com>
Date: Sun, 23 Mar 2003 11:36:34 -0000

Hello all,

I am coding an exploit using perl. The exploit needs to send each byte
individually instead of a large string to get round some trivial bounds
checking.

use Net::Telnet ();
$t->open(Host=> $host,
                     Port    => $port,
                     Errmode => $mode,
                     Timeout => $secs,);
$t ->put("\xFF");



However when I send \xFF bytes they get doubled up.

Any ideas?

Regards,
Gary


----------------------------------------------------------------------------
Did you know that you have VNC running on your network? 
Your hacker does. Plug your security holes now! 
Download a free 15-day trial of VAM:
http://www2.stillsecure.com/download/sf_vuln_list.html


Current thread: