Jan 3, 2022 | Certifications
Got time to read? This tasks was a bigger one. We have to pick 3 random metasploit payloads and analyze their shellcode. After building bind and reverse shell in the first two posts i chose the following (check all files on my github account): Exec whoami Readfile...
Jan 3, 2022 | Certifications
Welcome back to my second post for the SLAE certification. Today we are going to build a reverse_shell shellcode and again you can find the files here. This task is very similar to the first one, so i dont have to look up new/more information. Lets switch some...
Jan 3, 2022 | Certifications
Ready for the next level? – Method to exploit software even with small space for shellcode: EggHunting The third task was: Build an eggHunter-shellcode and a PoC to check functionality. After some googling i found a very interesting paper, which explains...
Jan 3, 2022 | Certifications
Hey ho, it’s time for some low-level shellcode encoding. After going through the encoder examples of the SLAE material I build a custom one, which you can find here. At first I wrote a little python script which takes every single byte of a given shellcode and...
Jan 3, 2022 | Certifications
I try to attend technical trainings regularly to get new input for my work. Therefore, in the past few months, I have completed additional trainings and earned certifications accordingly: Hands on Hacking by HackerHouse(Link)Certified Red Team Expert by...
Jan 3, 2022 | Certifications
The last post for my SLAE certification is about encryption of shellcode. As usual you can find all my files on github. Nothing special in place. Pick your favourite shellcode Use my custom AES encrypter Insert the encrypted Shellcode and secret AES key into the...