https://imgur.com/a/o6w3oZh Here is my problem
Lets say i want to bruteforce stack cookie on a remote app. I send my payload and while debugging stackframe, i notice 0x07 byte at the end of payload. payload is xored with 0xd so 0x07 byte is 0x0a (\n).
So i cannot bruteforce stack cookie because of that newline char. Never faced this problem before. Any help would be appreciated.
python -c 'print "payload"' | nc localhost port
or python script with
s = socket.socket()
s.send(payload)
or ctrl+c ctrl+v in netcat are the same problem.
Comments
> payload.rstrip()
python -c "print ('BBBB'+'A'*1026).rstrip('\n')" | nc localhost 1234
still raising an error
how about:
Same
Strange, btw I had an extra parenthesis at the end.