February
18th,
2019
Assignment four is all about obfuscating our x86_64 shellcode. Just like in the x86 version a lot of antivirus solutions are actually not terribly sophisticated and can be tripped up by just slightly modifying the code being executed to deviate from a known malicious signature ...
February
16th,
2019
Once again, just like with the x86 version of this assignment we were asked to research the topic of an egghunter as an exercise to be completed on our own ...
February
9th,
2019
Just like with the x86 version of this assignment it ended up being a lot less work than the first just due to the fact that we got to re-use about 90% of the assembly code that we wrote for assignment one. In fact, this assignment takes even less code than the bind shell and has the distinct advantage of reaching out and connecting directly to someone instead of just sitting around and hoping someone decides to connect ...
February
2nd,
2019
This will be the first post in the quest for the SLAE64 certification, creating a tcp bind shell in x86_64 assembly!
February
1st,
2019
October
16th,
2018
I was officially certified in the Offensive Security Certified Expert (OSCE) on October 15, 2018...
August
15th,
2018
July
16th,
2018
I was officially certified in the SecurityTube Linux Assembly Expert (SLAE) on July 12, 2018...
July
7th,
2018
Assignment seven of of the SLAE has us creating a custom crypter for our shellcode...
July
5th,
2018
Part three of assignment six of the SLAE has us performing our final polymorphic transformation on the Linux/x86 shellcode taken from shell-storm.org, shutdown -h now...