From: Gary O'leary-Steele (garyo@sec-1.com)
Date: Sun Mar 23 2003 - 06:36:34 EST
Hello all,
I am coding an exploit using perl. The exploit needs to send each byte
individually instead of a large string to get round some trivial bounds
checking.
use Net::Telnet ();
$t->open(Host=> $host,
Port => $port,
Errmode => $mode,
Timeout => $secs,);
$t ->put("\xFF");
However when I send \xFF bytes they get doubled up.
Any ideas?
Regards,
Gary
----------------------------------------------------------------------------
Did you know that you have VNC running on your network?
Your hacker does. Plug your security holes now!
Download a free 15-day trial of VAM:
http://www2.stillsecure.com/download/sf_vuln_list.html
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:31 EDT