Null offensive hacking hands-on training.

Proposed sessions for this event:

  • Primer to Assembly by Mihir Shah
  • Windows Shellcoding by Mihir Shah
Note: The session details including schedule are available below.


The session will be useful for participants preparing for OSEE

1. Understanding Win32 API and interacting with it
2. Understanding the usage of Win32 API calls within our exploits - (EIP Overwrite, SEH Handlers)
3. Writing W32 Shellcode and dynamically injecting it
4. Integrating the shellcode with our Handler and running the exploit - final POC
5. Basics of shellcoding a reverse shell - To be continued in a follow up session.

Hardware requirements:
1. System with admin rights and VT-x enabled
3. Minimum 4GB RAM and 200 GB HardDisk space
4. Bring Your Own Internet

Software requirements:
1. Win32 XP Machine
2. Python2 to be installed within the machine - This will be installed along with the installation of IDA
3. Install IDA -
4. Attacking Machine - Kali/Parrot
5. Vulnerable Software -
6. Arwin -
7. Virtual Box -

Prior Knowledge:
- Trivial understanding of python

Fill this questionnaire page

powered by Typeform

Failing to the above will automatically disqualify your nomination for this event.

Last date of registration: 07-NOV-2019 23:59.

Date Saturday November 09 2019
Chapter Bangalore
Registrations 37
Max Registrations Unlimited
Event Type Invite Only
Start Time 09:30 AM
End Time 04:30 PM

Session Schedule

Name Speaker Start Time End Time Resources
Primer to Assembly Mihir Shah 09:30 AM 11:30 AM
Windows Shellcoding Mihir Shah 11:30 AM 03:30 PM


This is an invite only event. If you are selected you will receive further information via e-mail.