Net:telnet exploit

From: Gary O'leary-Steele (garyo@sec-1.com)
Date: Sun Mar 23 2003 - 06:36:34 EST


Hello all,

I am coding an exploit using perl. The exploit needs to send each byte
individually instead of a large string to get round some trivial bounds
checking.

use Net::Telnet ();
$t->open(Host=> $host,
                     Port => $port,
                     Errmode => $mode,
                     Timeout => $secs,);
$t ->put("\xFF");

However when I send \xFF bytes they get doubled up.

Any ideas?

Regards,
Gary

----------------------------------------------------------------------------
Did you know that you have VNC running on your network?
Your hacker does. Plug your security holes now!
Download a free 15-day trial of VAM:
http://www2.stillsecure.com/download/sf_vuln_list.html



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:31 EDT