WIR INFORMIEREN

Schluss mit (Passwörter-) Chaos!

Das leidige Thema Passwörter und deren Verwaltung. Ich werde immer wieder gefragt, wie man dieses Problem lösen kann. Daher habe ich mich entschieden, einen kurzen Guide für KeePass zu verfassen. Also los geht’s 😉 #1 Installation und Erster Start Zunächst besorgt...

mehr lesen
SLAE Assignment #7 | Custom Cryptor

SLAE Assignment #7 | Custom Cryptor

The last post for my SLAE certification is about encryption of shellcode. As usual you can find all my files on github. Nothing special in place. Pick your favourit Shellcode Use my custom AES encrypter Insert the encrypted Shellcode and secret AES key into the...

mehr lesen

SLAE Assignment #6 | Polymorphing Shellcodes

This task (pick up 3 shellcodes from Shell-Storm and use polymorphism to beat pattern matching) sounds really sophisticated but you will see it's a very handy way for AV evasion for your shellcode. Check my github account for the files. We have to pick three random...

mehr lesen

SLAE Assignment #3 | x86 EggHunting

Ready for the next level? - Method to exploit software even with small space for shellcode: EggHunting The third task was: Build an eggHunter-shellcode and a PoC to check functionality. After some googling i found a very interesting paper, which explains eggHunting in...

mehr lesen

SLAE Assignment #2 | TCP Reverse_Shell

Welcome back to my second post for the SLAE certification. Today we are going to build a reverse_shell shellcode and again you can find the files here. This task is very similar to the first one, so i dont have to look up new/more information. Lets switch some...

mehr lesen

SLAE Assignment #1 | TCP Bind_Shell

After gaining my OSCP in June i decided to go deeper into exploitDev and shellcoding. And here we are, this is the first of seven posts for the SLAE certification. Addidionally you can find all files on my github account. Building a bind_shell shellcode is the first...

mehr lesen

Mini-Grundschutz für Zuhause

Jeden Tag werden Millionen von Menschen Opfer von Internetkriminalität. Diese werden in der Regel nicht von professionellen Hackern gezielt angegriffen, sondern werden zufällig Opfer von großflächigen Angriffen. Wie passiert so etwas? Die Angriffsvektoren sind...

mehr lesen

Archive