-
Recent Posts
- CTF Binary Exploitation – Cyber Apocalypse 2024: Hacker Royale – Death Note
- CTF Binary Exploitation – Cyber Apocalypse 2024: Hacker Royale – Pet Companion
- Shellcode – Windows/x86 – Create Administrator User – Dynamic PEB & EDT
- Creating your own AMSI Bypass using Powershell Reflection Technique
- Linux Shared Library Hijacking
Recent Comments
- Xavi on Exploit Development – Vulnserver TRUN – JMP EAX
- Merrell Vineza on Exploit Development – Vulnserver TRUN – JMP EAX
- Merrell Vineza on Exploit Development – Vulnserver TRUN – JMP EAX
- Xavi on Shellcoding Linux x86 – Bind Shell TCP – Assignment 1
- junsec on Shellcoding Linux x86 – Bind Shell TCP – Assignment 1
Archives
Categories
Meta
Tag Archives: SLAE
Shellcoding Linux x86 – Custom Crypter – Assignment 7
This post has been created for completing the requirements of the Pentester Academy Linux Assembly Expert Certification. Student ID: PA-8535 Before start this assignment, I have to say that this certification supposed some months of hard work but it’s completely … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment
Shellcoding Linux x86 – Polymorphic versions of known shellcodes – Assignment 6
This post has been created for completing the requirements of the Pentester Academy Linux Assembly Expert Certification. Student ID: PA-8535 For this assignment I have to modify three known shellcodes from Shell-Storm and create polymorphic versions of them. I’m going … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment
Shellcoding Linux x86 – Analyzing 3rd party shellcode – Assignment 5
This post has been created for completing the requirements of the Pentester Academy Linux Assembly Expert Certification. Student ID: PA-8535 The assignment requests to analyze three shellcodes, during the statement Vivek name three tools, so I’m going to analyze the … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment
Shellcoding Linux x86 – Custom Encoder – Assignment 4
This post has been created for completing the requirements of the Pentester Academy Linux Assembly Expert Certification. Student ID: PA-8535 I’m going to create a custom encoder/decoder to modify an original shellcode and after recover it and execute it. The … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment
Shellcoding Linux x86 – Egg Hunter – Assignment 3
This post has been created for completing the requirements of the Pentester Academy Linux Assembly Expert Certification. Student ID: PA-8535 Egg hunter is a type of shell code that is basically a two stages payload. The first stage searches for … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment
Shellcoding Linux x86 – Reverse Shell TCP – Assignment 2
This post has been created for completing the requirements of the Pentester Academy Linux Assembly Expert Certification. Student ID: PA-8535 Code structure: 1. Create a socket 2. Connect to a IP and port 3. Redirect STDIN, STDOUT and STDERR to … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment
Shellcoding Linux x86 – Bind Shell TCP – Assignment 1
This post has been created for completing the requirements of the Pentester Academy Linux Assembly Expert Certification. Student ID: PA-8535 To achieve the objective of creating a Bind Shell TCP, we need to understand the code structure that we need … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
2 Comments
Shellcoding Linux x86 XOR Encoder
Following the SLAE course I found an interesting subject that is how to create an encoder to hide our original shellcode. In this case we are going to use the XOR operation because it has the following property: (A xor … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment
Shellcoding Linux x86 STACK technique (3/3)
Hello, in this post I will explain how to use execve syscall in a shellcode using the stack technique, the purpose of this shellcode is the same as the last shellcode from the previous post. As I told you in … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment
Shellcoding Linux x86 JMP-CALL-POP technique (2/3)
Following the last article content, we are going to pop a shell instead of printing Hello World in the screen. To do this we are going to use the Execve syscall. This syscall allows us to execute a new program … Continue reading
Posted in Exploiting
Tagged Assembly, exploit-db, exploiting, hacking, linux, shellcode, shellcoding, SLAE, x86
Leave a comment