After taking control of CPU with a exploit, it is the job of shellcode to carry out intended attack, by executing a piece of assembly code on the victim machine. Shellcode can make or break the exploit with respect to a lot of factors, among them the differences in architectures of various targets. Learning the know how, to at least modify available shellcodes, can grant a wide range of options as opposed to using as is. Here, we will go over the basics and then move on to some sophisticated shellcode techniques.
Starts at Saturday September 15 2018, 12:30 PM. The sessions runs for about 1 hour.
0 0 0