Articles and Tutorials
SLAE Course & Exam
Creating shellcode from scratch to launch bind shell, i.e. exposing a port waiting for connection from the attacker to whom the "/bin/sh" shell will be issued.
Creating shellcode from scratch that launches reverse shell, i.e. sending a "/bin/sh" shell remotely to the specified address and port, listening using for example netcat.
- 3. Egg Hunting
Creating three implementations of Egg Hunters, thanks to which it is possible to execute very long shellcode, with little buffer space.
Encoding (Python) and Decoding (NASM) of the selected shellcode using ROT13, XOR, 2-byte right shift and insertion.
Analysis and explanation of the techniques used by the Msfvenom tool from the Metasploit-framework package when creating three different shellcodes.
- 6. Polymorphism
The use of polymorphism, i.e. optimization and change of programming techniques when writing code, while maintaining the function and operation of the program in relation to three ready shellcodes from shell-storm.org.
Implementation of AES 128 bit encryption with HMAC using SHA256 to make detection more difficult for anti-virus systems, using Python and shellcode running a reverse shell.