![]() |
https://www.exploit-db.com/exploits/44571 Testing out the above exploit but getting stuck at stage 10. It seems to read forever looking for "OK". Anyone have any suggestions? Overflows are not my strong point. The following changes were made to the script: line 44 -> changed localhost in the connect function to the target ip address line 82 -> changed to my ngrok listening address line 83 -> changed to my ngrok listening address Cheers |
All times are GMT. The time now is 05:04 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.