Exploit-Discord-Cache-System-PoC icon indicating copy to clipboard operation
Exploit-Discord-Cache-System-PoC copied to clipboard

victim.py not working

Open IDRALOU opened this issue 4 years ago • 11 comments

When i run the victim.py that make an error : ValueError: source code string cannot contain null bytes

IDRALOU avatar Jan 07 '21 19:01 IDRALOU

That's strange. What does the payload look like? Make sure it's a Python script.

ecriminal avatar Jan 08 '21 07:01 ecriminal

For test i just make a payload like print("Hello")

IDRALOU avatar Jan 08 '21 17:01 IDRALOU

What version of Python are you using? I used Python 3.9 for the demonstration.

ecriminal avatar Jan 15 '21 21:01 ecriminal

Me i use Python 3.8.2 version

IDRALOU avatar Jan 17 '21 10:01 IDRALOU

What version of Python are you using? I used Python 3.9 for the demonstration.

it doesn't work for me either i used the same version

cykagang avatar Jan 18 '21 15:01 cykagang

Make sure the encoding format for the payload is UTF-8. This can be changed in the text editor you're using.

ecriminal avatar Jan 18 '21 16:01 ecriminal

i have the same error, and on the same version

LocalsGitHub avatar Jan 19 '21 21:01 LocalsGitHub

Now when i execute the victim.py, that's make nothing.

IDRALOU avatar Jan 21 '21 21:01 IDRALOU

yeah it doesnt do anything at all for me

LocalsGitHub avatar Jan 21 '21 21:01 LocalsGitHub

same

Noob-A avatar Feb 10 '21 18:02 Noob-A

Proposal

Something to keep in mind, Discord will modify an image if its too big or whatever. This is how they attempt to equalize sizing in the emojis you send. So a way to play ball with this may be to upload your emoji, then re-download the image from discord and remake your payload with that.

Steps

  1. Upload emoji image to discord
  2. Right click and re-download the image
  3. Create your payload with the new image
  4. Re-upload

Keep in mind you can also check if the payload was successfully written to the file by running the strings command in Linux or could just run type in Windows to see if you can see your payload in plain-text

Pascal-0x90 avatar Mar 01 '21 07:03 Pascal-0x90