Happy new year everyone!
Today I like to share a small project I wrote with you. In this book I talk about how to write efficient shellcode for our exploits, taking the maximum profit of the WindowsAPI.
Syllabus goes like:
- Simple buffer overflows
- Basic shellcode: Intro to the Windows API, dealing with files and libraries
- Advanced shellcode: Resolving kernel32 in memory, resolving function addresses in memory, encoders/decoders and stagers
- Backdoors: Bind and reverse shells with sockets and droppers
- Working with exploits
For the examples written in the book I’ve used RADASM/MASM and OLLYDBG mostly