Json

Nice box, I wasn’t very familiar with this technique (user). Little tip, while developing the exploit, inspect traffic between machines and don’t just rely on what you see in the output. The errors may make you believe your code did not execute while it may have.