edcc423eea
This code is at the point where we SHOULD see a crash (given that the payloads in use for kernel/user are both just As and Bs (deliberate at this point). Unforunately the exploit does not result in a crash. Things just keep on going! I've looked at the difference in the traffic across the two different exploits (py and rb) and what's clear is that the mixin is doing a lot more work at the start. Also, the mixin generates packets of smaller size in the way that it encodes data (ie. it doesn't always use 2 bytes for a short value, it'll use 1 instead if only 1 is required). Pretty sure that the size issues aren't the problem, I think there's something else in play. I'm at the point where diving into the RDP stuff even more isn't inspiring so I'm hoping that opening this up to collab will help us move forward.