Net:telnet exploit

From: Gary O'leary-Steele (garyo@sec-1.com)
Date: Sun Mar 23 2003 - 03:36:34 PST

  • Next message: Balwant Rathore: "RE: Pen Test Study Group in Mumbai"

    Hello all,
    
    I am coding an exploit using perl. The exploit needs to send each byte
    individually instead of a large string to get round some trivial bounds
    checking.
    
    use Net::Telnet ();
    $t->open(Host=> $host,
                         Port    => $port,
                         Errmode => $mode,
                         Timeout => $secs,);
    $t ->put("\xFF");
    
    
    
    However when I send \xFF bytes they get doubled up.
    
    Any ideas?
    
    Regards,
    Gary
    
    
    ----------------------------------------------------------------------------
    Did you know that you have VNC running on your network? 
    Your hacker does. Plug your security holes now! 
    Download a free 15-day trial of VAM:
    http://www2.stillsecure.com/download/sf_vuln_list.html
    



    This archive was generated by hypermail 2b30 : Mon Mar 24 2003 - 08:41:27 PST