Null offensive hacking hands-on training.
Proposed sessions for this event:
- Primer to Assembly by Mihir Shah
- Windows Shellcoding by Mihir Shah
THIS EVENT HAS BEEN POSTPONED DUE TO UNFORESEEN CIRCUMSTANCES
The session will be useful for participants preparing for OSEE
Agenda:
1. Understanding Win32 API and interacting with it
2. Understanding the usage of Win32 API calls within our exploits - (EIP Overwrite, SEH Handlers)
3. Writing W32 Shellcode and dynamically injecting it
4. Integrating the shellcode with our Handler and running the exploit - final POC
5. Basics of shellcoding a reverse shell - To be continued in a follow up session.
Hardware requirements:
1. System with admin rights and VT-x enabled
3. Minimum 4GB RAM and 200 GB HardDisk space
4. Bring Your Own Internet
Software requirements:
1. Win32 XP Machine
2. Python2 to be installed within the machine - This will be installed along with the installation of IDA
3. Install IDA - https://www.hex-rays.com/products/ida/support/download_freeware.shtml
4. Attacking Machine - Kali/Parrot
5. Vulnerable Software - https://www.exploit-db.com/exploits/23243
6. Arwin - https://docs.google.com/uc?export=download&id=1SqdWY8bWfXJnhCynQL7PX2-C209WETdu
7. Virtual Box - https://www.virtualbox.org/wiki/Downloads
Prior Knowledge:
- Trivial understanding of python
Fill this questionnaire page
Failing to the above will automatically disqualify your nomination for this event.
Last date of registration: 07-NOV-2019 23:59.
Date | Saturday November 09 2019 |
---|---|
Chapter | Bangalore |
Registrations | 37 |
Max Registrations | Unlimited |
Event Type | Invite Only |
Start Time | 09:30 AM |
End Time | 04:30 PM |
Session Schedule
Name | Speaker | Start Time | End Time | Resources |
---|---|---|---|---|
Primer to Assembly | Mihir Shah | 09:30 AM | 11:30 AM | |
Windows Shellcoding | Mihir Shah | 11:30 AM | 03:30 PM |