ASM - Making your Own ASM Shellcode for open/read/write remote file on server
ASM 1.1 Generate Shellcode naivenom@kali:/opt/shellme$ objdump -d ./test|grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d' '|tr -s ' '|tr '\t' ' '|sed 's/ $//g'|sed 's/ /\\x/g'|paste -d '' -s |sed 's/^/"/'|sed 's/$/"/g' Compilar una shellcode en asm: sudo nasm -f elf64 -o test.o test.asm sudo ld -nostartfiles -nostdlib -z noexecstack -m elf_x86_64 -s -o test test.o 1.2 Writing your ASM C..
Pwning in Linux
2019. 2. 28. 16:08
Notice
Recent Posts
Recent Comments
- Total
- Today
- Yesterday
Link
TAG
- format string
- cracking
- write primitive
- pwnable.xyz
- canary
- ASM
- GOT Dereferencing/Overwriting
- one gadget
- theFaunia course
- Backdoors
- buffer overflow
- open-redirect
- leak libc
- Pwnable.kr
- shellcode
- x64dbg
- arithmetic overflow/underflow
- html injection
- dnspy
- pwnable.tw
- leak stack memory address
- use after free
- Windows
- stack pivot
- hijacking redirection flow
- fake stack frame
- Call oriented programming
- 32Bit
- XSS
- return oriented programming
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 |
Archives