Analysis of Shellcode Part Three of Three - linux/x64/exec

Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part three of three, linux/x64/exec ...

[Read More]

Analysis of Shellcode Part Two of Three - linux/x64/shell_bind_tcp_random_port

Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part two of three, linux/x64/shell_bind_tcp_random_port ...

[Read More]

Analysis of Shellcode Part One of Three - linux/x64/shell_bind_tcp

Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part one of three, linux/x64/shell_bind_tcp ...

[Read More]

Creating a Custom Shellcode Encoder in x86_64

Assignment four is all about obfuscating our x86_64 shellcode. Just like in the x86 version a lot of antivirus solutions are actually not terribly sophisticated and can be tripped up by just slightly modifying the code being executed to deviate from a known malicious signature ...

[Read More]

Creating Shellcode for an Egg Hunter in x86_64

Once again, just like with the x86 version of this assignment we were asked to research the topic of an egghunter as an exercise to be completed on our own ...

[Read More]

Creating Shellcode to Open a Reverse Shell Over TCP in x86_64

Just like with the x86 version of this assignment it ended up being a lot less work than the first just due to the fact that we got to re-use about 90% of the assembly code that we wrote for assignment one. In fact, this assignment takes even less code than the bind shell and has the distinct advantage of reaching out and connecting directly to someone instead of just sitting around and hoping someone decides to connect ...

[Read More]

Creating Shellcode to Bind a Shell Over TCP in x86_64

This will be the first post in the quest for the SLAE64 certification, creating a tcp bind shell in x86_64 assembly!

[Read More]

Starting SecurityTube Linux Assembly Expert 64 (SLAE64)

After completing my journey to becoming an OSCE I shifted my next certification goal to the the OSEE, however my experience with x86_64 shellcode is fairly limited. Since I found the x86 version of the SecurityTube Linux Assembly Expert (SLAE) to be incredibly useful in preparing for the OSCE I figured I should go ahead and start working on the SecurityTube Linux Assembly Expert 64 (SLAE64).

Let the journey becoming an SLAE64 begin …

SecurityTube Linux Assembly Expert (SLAE)

Completed Offensive Security Certified Expert (OSCE)

I was officially certified in the Offensive Security Certified Expert (OSCE) on October 15, 2018...

[Read More]

Starting Offensive Security Certified Expert

After completing my journey to attaining the SecurityTube Linux Assembly Expert (SLAE) certification I decided it was time to start working on the Offensive Security Certified Expert

Wish me luck … cause here we go!