A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


POP POP RETN ; An Introduction to Writing Win32 Shellcode - Christopher Maddalena Derbycon 2017 (Hacking Illustrated Series InfoSec Tutorial Videos)

POP POP RETN ; An Introduction to Writing Win32 Shellcode
Christopher Maddalena
Derbycon 2017

If you have ever worked with an exploit or Metasploit, you have probably used shellcode, but do you know how it is made? This talk has been designed to walk you through the ins and outs of basic shellcode, with a focus on Windows and the x86 architecture. There will be a review of the basic computer science behind shellcode, a look under the hood of msfvenom works and how you can recreate msfvenom's shellcode in Assembly, and then a walkthrough and a demo of how you can create a custom connectback stager using Assembly.

Chris Maddalena is a Michigan-area security consultant who specializes in red teaming. Chris is involved with penetration testing, physical security, phishing, and on-site social engineering. He is also active in tool development, specifically in the areas of recon and phishing, and has released several publicly on GitHub. Chris is heavily involved with the Michigan security group, #misec, where he manages the "misecgroup" YouTube channel to make recordings of local presentations and workshops available to the community.

@cmaddalena

Back to Derbycon 2017 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast