Tags » Shellcode

Smashing the ARM Stack: ARM Exploitation Part 1

In this post, we are going to begin exploring the fundamentals of ARM exploitation. First, we will begin by addressing stack smashing on the ARM architecture.  3,841 more words

Binary Exploit

How to write a (Linux x86) custom encoded shellcode

Goal

Very often the shellcode authors will try to obfuscate the shellcode in order to bypass the ids/ips or the anti-viruses. This kind of shellcode is often call an “encoded shellcode”.   909 more words

IT Security

Update: shellcode2vba.py Version 0.4

shellcode2vba.py is a Python program to create VBA code to inject shellcode. This new version has 3 new options:

Option –nocreatethread allows you to instruct the program not to add the VBA code to create a new thread. 68 more words

My Software

Explaining Malware Analysis – smart assembly trick (version 1.1)

Hello readers, how are you? Today I received a simple question from a student about the correct interpretation of the following assembly code:

  1. 00405035:    EB 03        JMP SHORT…
  2. 304 more words
Links

Download Top Hacker Shells

In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability.
Hackers usually take advantage of an upload panel designed for uploading images onto sites. 104 more words

Geek Stuff

Write up: 2015 Sans Holiday Hack Challenge - Part 4.5

Introduction

San Institute regularly creates a Christmas holiday hack challenge.

These challenges are a good way to try out new techniques or grow your knowledge in some new area. 6,830 more words

Ctf

Introduction to Windows shellcode development – Part 2

If you missed the first part of this series, where you can read about what is a shellcode and how it works, you can find it here: … 3,229 more words

Pentest Techniques