what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files

Linux x86 Reverse Engineering
Posted Apr 18, 2014
Authored by Harsh Daftary | Site securitylabs.in

Whitepaper called Linux x86 Reverse Engineering - Shellcode Disassembling and XOR decryption.

tags | paper, x86, shellcode
systems | linux
SHA-256 | cb84ec2a60fee3741cfa17047e6a2165d0cad06edf94ce2d2f2ec149c7414f6d
Shellcoding In Linux
Posted Sep 3, 2012
Authored by Ajin Abraham | Site keralacyberforce.in

This is a whitepaper that was written for beginners learning how to write shellcode.

tags | paper, shellcode
SHA-256 | 4408a4e26d5d0e08d0400d47fc4b5fbdc7ea9f4db3d206e9f0a533805edf17ed
Alphanumeric Shellcode
Posted Jun 12, 2012
Authored by hatter of BHA | Site blackhatacademy.org

Alphanumeric shellcode is similar to ascii shellcode in that it is used to bypass character filters and evade intrusion-detection during buffer overflow exploitation. This article documents alphanumeric code on multiple architectures, but primarily the 64 bit x86 architecture. Alphanumeric shellcode requires a basic understanding of bitwise math, assembly and shellcode.

tags | paper, overflow, x86, shellcode
SHA-256 | 58bd7026c178df13e32741aeefd385da0fd61df0dd758c8fe3d294c3c7f8be08
Construindo Shellcodes
Posted Dec 25, 2011
Authored by m0nad

Whitepaper called Construindo Shellcodes. It discusses how to build shellcodes and use them. Written in Portuguese.

tags | paper, shellcode
SHA-256 | 8a69b4c29cd9e658b54a12c337266f622bc5a9644d51ae9a62cf454b59fa26b1
Simple x64 XOR Shellcode Obfuscation
Posted Sep 2, 2011
Authored by entropy | Site phiral.net

This is part two of the Simple x64 XOR Shellcode Encoder / Loader paper that adds in simple obfuscation.

tags | paper, shell, shellcode
SHA-256 | 07015c0dcec4eea8611e3ed8e6f9f82d8774813630fd343151116458df7fc37b
Simple x64 XOR Shellcode Encoder / Loader
Posted Aug 30, 2011
Authored by entropy | Site phiral.net

This is a simple tutorial that also provides a code example on doing a x64 xor encoder and loader for shellcode. hello_world, shell with setreuid, and portbind shellcode examples are provided.

tags | paper, shell, shellcode
SHA-256 | 01dd8d4138095d6e5cd36ad14d49a7c9867d04d3b19cf8010f5b4ffa35e94746
How To Create Your Own Shellcode On Arch Linux
Posted Jul 23, 2011
Authored by N3td3v!l

Whitepaper called How To Create Your Own Shellcode On Arch Linux.

tags | paper, shellcode
systems | linux
SHA-256 | a86b5a24bc7c7e5373a8800389143e2b87b4ee9bd2bb60c36fcb9ba75c126768
Writing Manual Shellcode By Hand
Posted Mar 29, 2011
Authored by MaXe

Whitepaper called Writing Manual Shellcode by Hand.

tags | paper, shellcode
SHA-256 | 061997e84eadf0ea80fa13c73f114ab9cb5632b12b77b660304a855a3f885f72
How To Create Shellcode On ARM Architecture
Posted Dec 2, 2010
Authored by Jonathan Salwan

Whitepaper called How To Create a Shellcode on ARM Architecture.

tags | paper, shellcode
SHA-256 | afc96ecde2f45d34049429d3da01bbc11524655aa7184ff5ccbd014a45ed7f61
how-to-create-polymorphic-shellcode.txt
Posted Jul 8, 2010
Authored by Jonathan Salwan | Site shell-storm.org

Whitepaper called How to create a polymorphic shellcode.

tags | paper, shellcode
SHA-256 | d1fd355e88fcde0310c5c3e33b05b23f2ada9bbf2558047dd96893d2881e67eb
how-to-create-shellcode.txt
Posted Jul 8, 2010
Authored by Jonathan Salwan | Site shell-storm.org

Whitepaper called How to create a shellcode on Linux / x86.

tags | paper, x86, shellcode
systems | linux
SHA-256 | be8ad7a3a06855a46d70be336cf0396e40311d917b41a72c66e17cc4f8048afc
Introduction To Win32 Shellcoding
Posted Mar 9, 2010
Authored by Peter Van Eeckhoutte | Site corelan.be

Introduction to Win32 shellcoding. Part 9 in a series of tutorials.

tags | paper, shellcode
systems | windows
SHA-256 | c348962751540735326efe86583d329a1d5165a9eee59075a9f4cc774b7a452e
Win32 Egg Hunting
Posted Mar 9, 2010
Authored by Peter Van Eeckhoutte | Site corelan.be

Win32 Egg Hunting. Part 8 in a series of tutorials.

tags | paper, shellcode
systems | windows
SHA-256 | 10e73a2c8d92681faa9e39235b47821f5f3bf942e2cfd8556dc2fee20a9ffa8e
Writing JIT-Spray Shellcode For Fun And Profit
Posted Mar 8, 2010
Authored by Alexey Sintsov | Site dsecrg.com

Whitepaper called Writing JIT-Spray Shellcode For Fun And Profit.

tags | paper, shellcode
SHA-256 | c63788300beae3066d70ac6a350d32e8cc1e68446bc632aafb68473e7976af03
Introduction To Win32 Shellcoding
Posted Feb 27, 2010
Authored by corelanc0d3r

Exploit writing tutorial 9 - Introduction to Win32 shellcoding.

tags | paper, shellcode
systems | windows
SHA-256 | 3706f35a0ce8ee03fa0b64d0df8875570a1887011f234d325ca5f281b133b56b
Building Your Own Shellcode
Posted Feb 10, 2010
Authored by FB1H2S

Whitepaper called Building Your Own Shell-codes.

tags | paper, shell, shellcode
SHA-256 | 86ef527d9aa10343480e09786cd1e4d1938ad0c3b246d7d5f2f5973fcf16289d
Whitepaper Called English Shellcode
Posted Nov 24, 2009
Authored by Greg MacManus, Fabian Monrose, Joshua Mason, Sam Small

Whitepaper called English Shellcode. In this paper, they challenge the assumption that shellcode must conform to superficial and discernible representations. Specifically, they demonstrate a technique for automatically producing English Shellcode, transforming arbitrary shell-code into a representation that is superficially similar to English prose.

tags | paper, arbitrary, shell, shellcode
SHA-256 | 520adbcbc20b5b74ff45288dfb818039f329155c76d5816f3314408df708f644
Spector - Automatically Analyzing Shell Code
Posted Jul 8, 2009
Authored by Mark Zielinski, Atul Prakash, Kevin Borders

Whitepaper called Spector: Automatically Analyzing Shell Code.

tags | paper, shell, shellcode
SHA-256 | 48ece968a47b6a78a543ac11868c445687fd0d92b816b6b54404c203b8529fcd
Creating Shellcode For Linux x86 32-bit
Posted Apr 7, 2009
Authored by Jonathan Salwan | Site shell-storm.org

Whitepaper called Creating Shellcode for the Linux x86 32-bit architecture. Written in French.

tags | paper, x86, shellcode
systems | linux
SHA-256 | f7abea32722ccf3a4a3e7cf6faade5775a23fe7071cdde7fe5c3930d10523c4e
ShellCodeForBeginners.pdf
Posted Oct 3, 2008
Authored by Beenu Arora | Site beenuarora.com

ShellCode For Beginners - A short whitepaper discussing what defines shellcode and simple fundamentals surrounding its use.

tags | paper, shellcode
SHA-256 | 1f3f95250b72edf4c8401066283dbc4fcebcc43a81a3faabe29da879973ffeba
shellcode.pdf
Posted Apr 10, 2007
Authored by Nexus | Site playhack.net

Whitepaper: Linux Shellcoding Reference.

tags | paper, shellcode
systems | linux
SHA-256 | 66b56a2a402353559920e7cc92cbdf62a89aef2b05132f52f60437a01a69c71b
WritingSmallShellcode.pdf
Posted Sep 23, 2005
Authored by Dafydd Stuttard | Site ngssoftware.com

This paper describes an attempt to write Win32 shellcode that is as small as possible, to perform a common task subject to reasonable constraints. The solution presented implements a bindshell in 191 bytes of null-free code, and outlines some general ideas for writing small shellcode.

tags | paper, shellcode
systems | windows
SHA-256 | a4631261a3729136f9d6a5d804e1c7cdf1a8baf9350860bdca03b63296b139a2
ecl-poly.txt
Posted Aug 5, 2005
Authored by Yuri Gushin | Site ecl-labs.org

Whitepaper entitled 'NIDS Polymorphic Evasion - The End?'. This paper explains how even the most modern of NIDS fail to detect polymorphic shellcode.

tags | paper, shellcode
SHA-256 | 3c6e4f916e13381251401f462b3e2128ca6d50fa3050aa9efdad122aee3d6e88
whitepaper_shellcode.html
Posted Nov 20, 2004
Authored by SkyLined | Site edup.tudelft.nl

Writing IA32 Restricted Instruction Set Shellcode Decoder Loops - This article addresses the requirements for writing a shellcode decoder loop using a limited number of characters that limits the instruction set. Most of it is based on the author's experience with alphanumeric decoders but the principles apply to any piece of code that is written to work with a limited instruction set.

tags | paper, shellcode
SHA-256 | 2aea2ebf088e500f6e82bebaad1ecbf8639a257cb6f76e1538ffef1687c2a19a
intro_to_shellcoding.pdf
Posted Oct 13, 2004
Authored by Michel Blomgren | Site tigerteam.se

Introduction to Shellcode: How to exploit buffer overflows. A very thorough and well written paper on how it all works. A good read for anyone curious and even those who already think they know it all. It includes step by step examples from vulnerability discovery to a finished exploit. The paper focuses on x86 Intel syntax assembly under Linux.

tags | paper, overflow, x86, shellcode
systems | linux
SHA-256 | 1929d512b64ef4d90495bb2026a18ce18306161bf9fb0cda06032dfadf958381
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
What Happens When Crypto Derivatives Crash
Posted Jan 26, 2023

tags | headline, fraud, cryptography
Notice On Hive Ransomware Site Claims Seizure By FBI, Europol
Posted Jan 26, 2023

tags | headline, government, malware, cybercrime, fraud, fbi, cryptography
RSA's Demise From Quantum Attacks Is Very Much Exaggerated
Posted Jan 26, 2023

tags | headline, privacy, password, science, cryptography
Months After NSA Disclosed Microsoft Cert Bug, Datacenters Remain Unpatched
Posted Jan 26, 2023

tags | headline, privacy, microsoft, flaw, nsa, cryptography
Hackers Demand $10M From Riot Games To Stop Leak Of League Of Legends Source Code
Posted Jan 25, 2023

tags | headline, hacker, cybercrime, data loss, fraud
DragonSpark Threat Actor Leverages Open Source RAT
Posted Jan 25, 2023

tags | headline, hacker, malware, china, backdoor
GoTo Warns Customers Of Crypto Key And Backup Heist
Posted Jan 25, 2023

tags | headline, hacker, privacy, data loss, password
Quantum Computers No Threat To Encryption Just Yet
Posted Jan 25, 2023

tags | headline, password, science, cryptography
Ransomware Victims Are Refusing To Pay
Posted Jan 24, 2023

tags | headline, hacker, malware, cybercrime, data loss, fraud, cryptography
Microsoft To Invest Billions In Chatbot Maker OpenAI
Posted Jan 24, 2023

tags | headline, microsoft, botnet, science
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close