Skip to content
Hodorsec

Hodorsec

Hodoring the internet for all kinds of IT Security vulnerabilities.

  • Github page
  • Twitter
  • Hackthebox

6.B. Reverse TCP bind shell

Linux/x86 – Reverse TCP bind shell – 92 bytes by Russell Willis
http://shell-storm.org/shellcode/files/shellcode-849.php

SLAE

  • 0. SLAE – Generic
  • 1. Shell bind TCP shellcode
    • 1.A. Compiling and running file
    • 1.B. Optimizing file
    • 1.C. Run again
  • 2. Shell reverse TCP shellcode
    • 2.A. Setting up initial file
    • 2.B. Compiling and running file
    • 2.C. Optimizing file
    • 2.D. Rerun program, mitigation & saving bytes
    • 2.E. Converting shellcode to C
  • 3. Egghunter shellcode
    • 3.A. Setting up initial file
    • 3.B. Compiling and running file
    • 3.C. Optimizing file
  • 4. Custom encoding for “Insertion Encoder”
    • 4.A. Setting up initial file
    • 4.B. Compiling and running file
    • 4.C. Optimizing file
  • 5. Dissecting MSF shellcode samples
    • 5.A. Preface
    • 5.B. linux/x86/adduser
      • 5.B.1. Analysis
      • 5.B.2. Optimizing and running ASM
      • 5.B.3. Libemu analysis
      • 5.B.4. Radare2 Analysis
    • 5.C. linux/x86/chmod
      • 5.C.1. Analysis
      • 5.C.2. Optimizing and running ASM
    • 5.D. linux/x86/read_file
      • 5.D.1. Analysis
      • 5.D.2. Optimizing and running ASM
  • 6. Polymorphic version of shellcodes from Shell-Storm
    • 6.A. Preface
    • 6.B. Reverse TCP bind shell
      • 6.B.1. Assignment
      • 6.B.2. Optimizing original
      • 6.B.3. Scanning the file using virustotal.com
    • 6.C. ASLR Deactivation
      • 6.C.1. Assignment
      • 6.C.2. Optimizing original
      • 6.C.3. Scanning the file using virustotal.com
      • 6.C.4. Further optimization
      • 6.C.5. Radare2 analysis
      • 6.C.6. GDB analysis
    • 6.D. Send string to all terminals
      • 6.D.1. Assignment
      • 6.D.2. Optimizing original
      • 6.D.3. Further optimization
      • 6.D.4. Scanning the file using virustotal.com
      • 6.D.5. Radare2 Analysis
  • 7. Custom crypter
    • 7.A. Preface
    • 7.B. Encrypting payload and run binary
    • 7.C. Using other payload

Archives

  • January 2019

Categories

  • Uncategorized
  • Github page
  • Twitter
  • Hackthebox
Hodorsec Proudly powered by WordPress