I'm trying to attack the vulnserver from different angles ( can be found here: ). I'm stuck on fuzzing, I know which commands are vulnerable and all that. But I want to be able to reproduce the steps into my next project. My questing is, how would I figure out to use the /.:/ manually in my exploit, where does that come from? without it there is no buffer overflow on the TRUN command. Yet I can't seem to find a logical way to find it.


Sign In to comment.