This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification." http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE64-1434 Target Operating System : 64 bit Linux (x86_64 GNU/Linux) Assignment 5: Take any 3 shellcodes from msfpayload (msfvenom), the 64 bit one for Linux, and then use GDB to disassemble it and dissect its functionality. Document the analysis. The three shellcodes that I have decided to analyze are: linux/x64/shell_bind_tcp_random_port linux/x64/exec linux/x64/shell/reverse_tcp The First Shellcode I have created my own version of this which I have blogged about here: http://a41l4.blogspot.ca/2017/02/shellrandomlisten1434.html The first shellcode that I will analyze is: linux/x64/shell_bind_tcp_random_port Output the shellcode in a compatible format for the C programming language: msfvenom -p linux/x64/shell_bind_tcp_random_p...
Cryptic thoughts, analysis of code, assembler projects, information security topics