Lesson 4.2 - Injecting with CreateRemoteThread

The focus of this post is to analyze a simple injection technique commonly known as *CreateRemoteThread Shellcode Injection*, which is fairly easy to implement and, unfortunately, to detect.

Continue reading »

Windows Shellcoding: Day 1

Compared to Unix systems, writing shellcode for Windows is way more difficult, due to the lack of documentation and open-source code. In this post, I'm showing how to write a simple reboot shellcode.

Continue reading »

SLAE64 - Assignment 7

As for the exam SLAE32, the seventh assignment requires the implementation of an decryption scheme to your liking, although it must be done in 64-bit assembly compared to the previous case.

Continue reading »

SLAE64 - Assignment 6.3

Continue reading »

SLAE64 - Assignment 6.2

Continue reading »

SLAE64 - Assignment 6.1

Continue reading »

SLAE64 - Assignment 5.3

Continue reading »

SLAE64 - Assignment 5.2

The second shellcode I'll be analyzing for this assignement is "linux/x64/pingback_reverse_tcp" from the Metasploit framework. It connects to a specific TCP listener and then it sends a GUID hard-coded inside the shellcode.

Continue reading »

SLAE64 - Assignment 5.1

The fifth assignment for the SLAE64 exam consists in choosing three or more shellcodes and then analyzing them in a detailed manner. The first one is taken from the Metasploit framework and is named "linux/x64/meterpreter/reverse_tcp"; it creates a TCP reverse shell, however it does not spawn a simple a /bin/sh shell, but a Meterpreter session, which is more of a Command and Control beacon.

Continue reading »

SLAE64 - Assignment 4

The fourth assignment of the SLAE64 exam is to implement a customer encoding scheme and use it to encode a shellcode, and also run it without crashing I guess...

Continue reading »