In this post, I will create a shellcode crypter/decryptor in Golang. The encryption algorithm that I will use is AES, which is a symmetric key…
Crafting Linux x86 Polymorphic Shellcodes
In this post, I am going to refer 3 Linux x86 shellcodes from shell-storm database and create their polymorphic versions. To elaborate, I will try…
Analyzing Linux x86 shellcodes
In the previous posts, we have looked at creating shellcodes. In this post, I will cover analyses of 3 shellcodes generated using msfvenom. All the…
Building an x86 custom encoder
In this post, we will discuss custom encoding. The premise is simple: A client side encoder will encode the shellcode. This encoded shellcode will be…
Creating a Linux x86 Egghunter in Assembly
As I have been exploring Assembly shellcoding, I am being amazed everyday on the kind of things that can be done. A great deal of…
Creating Linux x86 reverse shell in Assembly
In the last post, I covered the walk through of bind shellcode in assembly. In this post, I will work on the same lines and…
Creating Linux x86 bind shell in Assembly
Like everyone else, I have been swapping payloads within the exploits with few key-presses. Metasploit and Msfvenom are such wonderful tools that they ease out…
Building a covert SMTP infrastructure – Part I
Introduction Phishing is a ray of light when every attempt to breach an organization fails. However, setting up a covert SMTP infrastructure for phishing is…
Bypassing Detection for a Reverse Meterpreter Shell
This post discusses creation of an executable which spawns a reverse Meterpreter shell. All the tools used in this post are publicly available. In the…
Exploiting Buffer Overflow Minishare 1.4.1
Introduction Buffer overflow is one of the most interesting concepts that I know. In this write-up, I will exploit the buffer overflow in MiniShare application.…