I’m trying to attack the vulnserver from different angles ( can be found here: http://sites.google.com/site/lupingreycorner/vulnserver.zip ). I’m stuck on fuzzing, I know which commands are vulnerable and all that. But I want to be able to reproduce the steps into my next project. My questing is, how would I figure out to use the /. manually in my exploit, where does that come from? without it there is no buffer overflow on the TRUN command. Yet I can’t seem to find a logical way to find it.