shellcode

Linux X86 Assembly – How To Test Custom Shellcode Using a C Payload Tester
Overview In the last blog post in this series, we created a tool to make it easy to build our custom payloads and extract them. However, what if we want to test ...

Linux X86 Assembly – How to Make Our Hello World Usable as an Exploit Payload
Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 assembly. While this can help us learn x86 assembly, it isn’t viable as a ...

Linux X86 Assembly – How to Build a Hello World Program in NASM
Overview A processor understands bytecode instructions specific to that architecture. We as humans use mnemonics to make building these instructions easier than remembering a bunch of binary codes. These mnemonics are known ...

A Hacker’s Tour of the X86 CPU Architecture
Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, laptops, and servers. While other architectures exist and are even taking some market share with mobile ...
Video: Shellcode for the Masses
Watch Now to Learn Shellcoding from the Ground Up! Video and Slide Deck from EH-Net Live! January 2020 In the art of binary exploitation, there is one ominous “hacker” term you will ...
Webinar: Shellcode for the Masses
Register Now to Learn Shellcoding from the Ground Up! In the art of binary exploitation, there is one ominous "hacker" term you will hear quite often: shellcode. What is shellcode? How can ...

Congratulations, You’ve Won a Meterpreter Shell
Posted by Josh Stroschein, Ratnesh Pandey and Alex Holland. For an attack to succeed undetected, attackers need to limit the creation of file and network artifacts by their malware. In this post, ...