The purpose of this course is to teach a cyclic procedure to do reverse engineering and backdoors malware patching in modern real software by modifying the code using assembly language. The opportunities that one program or another can offer us depend on the protections that the program has and its functionality. Also it is importat the persistence in Windows system for Red Team purpose. The mai..
ASM 1.1 Generate Shellcode naivenom@kali:/opt/shellme$ objdump -d ./test|grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d' '|tr -s ' '|tr '\t' ' '|sed 's/ $//g'|sed 's/ /\\x/g'|paste -d '' -s |sed 's/^/"/'|sed 's/$/"/g' Compilar una shellcode en asm: sudo nasm -f elf64 -o test.o test.asm sudo ld -nostartfiles -nostdlib -z noexecstack -m elf_x86_64 -s -o test test.o 1.2 Writing your ASM C..
- Total
- Today
- Yesterday
- 32Bit
- buffer overflow
- Windows
- leak libc
- canary
- stack pivot
- format string
- shellcode
- pwnable.xyz
- one gadget
- write primitive
- hijacking redirection flow
- XSS
- Backdoors
- arithmetic overflow/underflow
- Call oriented programming
- dnspy
- cracking
- leak stack memory address
- ASM
- use after free
- GOT Dereferencing/Overwriting
- pwnable.tw
- Pwnable.kr
- open-redirect
- x64dbg
- fake stack frame
- html injection
- return oriented programming
- theFaunia course
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |