newline in network payload

edited July 2018 in Exploits Here is my problem
Lets say i want to bruteforce stack cookie on a remote app. I send my payload and while debugging stackframe, i notice 0x07 byte at the end of payload. payload is xored with 0xd so 0x07 byte is 0x0a (\n).
So i cannot bruteforce stack cookie because of that newline char. Never faced this problem before. Any help would be appreciated.

python -c 'print "payload"' | nc localhost port
or python script with
s = socket.socket()
or ctrl+c ctrl+v in netcat are the same problem.



Sign In to comment.