SLAE Assignment #7 | Custom Cryptor

The last post for my SLAE certification is about encryption of shellcode. As usual you can find all my files on github. Nothing special in place. Pick your favourite shellcode Use my custom AES encrypter Insert the encrypted shellcode and secret AES key into the decrypter Test the decrypted shellcode in our skeleton shellcode.c file […]

SLAE Assignment #6 | Polymorphing Shellcodes

This task (pick up 3 shellcodes from Shell-Storm and use polymorphism to beat pattern matching) sounds really sophisticated but you will see it’s a very handy way for AV evasion for your shellcode. Check my github account for the files. We have to pick three random shellcodes from shell-storm. /bin/sh /bin/sh -c “ping localhost” chmod […]

SLAE Assignment #5 | Analyze Metasploit Payloads

Got time to read? This tasks was a bigger one. We have to pick 3 random metasploit payloads and analyze their shellcode. After building bind and reverse shell in the first two posts i chose the following (check all files on my github account): Exec whoami Readfile Adduser Exec whoami First I generated my shellcode […]

SLAE Assignment #4 | Custom Shellcode Encoder

Hey ho, it’s time for some low-level shellcode encoding. After going through the encoder examples of the SLAE material I build a custom one, which you can find here. At first I wrote a little python script which takes every single byte of a given shellcode and subtracts a random integer from it. In the […]

SLAE Assignment #3 | x86 EggHunting

Ready for the next level? – Method to exploit software even with small space for shellcode: EggHunting The third task was: Build an eggHunter shellcode and a PoC to check functionality. After some googling i found a very interesting paper, which explains eggHunting in general and shows 6 implementations (3x Linux/ 3x Windows). I chose […]

SLAE Assignment #2 | TCP Reverse_Shell

Welcome back to my second post for the SLAE certification. Today we are going to build a reverse_shell shellcode and again you can find the files here. This task is very similar to the first one, so i dont have to look up new/more information. Lets switch some syscalls and registers! The code for socket_setup, […]

SLAE Assignment #1 | TCP Bind_Shell

After gaining my OSCP in June I decided to go deeper into exploitDev and shellcoding. And here we are, this is the first of seven posts for the SLAE certification. Addidionally you can find all files on my github account. Building a bind_shell shellcode is the first task. In an exercise of the course we […]

Mini basic protection for home

Every day, millions of people become victims of cybercrime. These are usually not targeted by professional hackers, but fall victim to large-scale attacks by chance. How does something like this happen? The attack vectors are versatile: Phishing e-mails Modified files Drive-by downloads Bad passwords Physical access Removable media (e.g. BadUSB) etc. Attackers permanently scan the […]

Offensive Security Certified Professional Experience / OSCP Review

Today I would like to share my experience with OSCP from the guys at Offensive Security. Why OSCP? There are now so many certifications in the field of information security that it is difficult to choose one. For me, criteria are the deciding factor in certifications: Learn new Apply knowledge (i.e. no multiple choice tests) […]

UK – German Cyber-Security Forum

UK – German Cyber-Security Forum On 26.07.2017, the second Cyber-Security Forum of the British Consulate and the Munich Security Network was held at the Hilton Park Hotel. Here, the CISOs of well-known German companies such as Siemens, Audi and MAN gave various expert presentations. Topics such as Industry 4.0 and AI were presented in a […]