March
14th,
2019
I was officially certified in the SecurityTube Linux Assembly Expert x86_64 (SLAE64) on March 14, 2019...
March
12th,
2019
Assignment seven of of the SLAE64 has us creating an Linux/x86_64 custom crypter for our shellcode...
March
11th,
2019
Part three of assignment six of the SLAE64 has us performing our third and final polymorphic transformation on the Linux/x64 shellcode taken from shell-storm.org, Linux/x86_64 reboot(POWER_OFF)...
March
10th,
2019
Part two of assignment six of the SLAE64 has us performing our second polymorphic transformation on the Linux/x64 shellcode taken from shell-storm.org, execve("/bin/sh")...
March
9th,
2019
Part one of assignment six of the SLAE64 has us performing our first polymorphic transformation on the Linux/x64 shellcode taken from shell-storm.org, sethostname() & killall...
March
7th,
2019
Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part three of three, linux/x64/exec ...
March
4th,
2019
Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part two of three, linux/x64/shell_bind_tcp_random_port ...
March
3rd,
2019
Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part one of three, linux/x64/shell_bind_tcp ...
February
18th,
2019
Assignment four is all about obfuscating our x86_64 shellcode. Just like in the x86 version a lot of antivirus solutions are actually not terribly sophisticated and can be tripped up by just slightly modifying the code being executed to deviate from a known malicious signature ...
February
16th,
2019
Once again, just like with the x86 version of this assignment we were asked to research the topic of an egghunter as an exercise to be completed on our own ...