
SLAE Challenge 5C: Analyse linux/x86/shell_bind_tcp_random_port by libemu
- Take up at least 3 shellcode samples created using Msfpayload for linux/x86 - Use GDB/Ndisasm/Libemu to dissect the funcSonality of the shellcode - Present your analysis
- Take up at least 3 shellcode samples created using Msfpayload for linux/x86 - Use GDB/Ndisasm/Libemu to dissect the funcSonality of the shellcode - Present your analysis
- Take up at least 3 shellcode samples created using Msfpayload for linux/x86 - Use GDB/Ndisasm/Libemu to dissect the funcSonality of the shellcode - Present your analysis
- Take up at least 3 shellcode samples created using Msfpayload for linux/x86 - Use GDB/Ndisasm/Libemu to dissect the funcSonality of the shellcode - Present your analysis
Create a custom encoding scheme like the “Insertion Encoder” we showed you PoC with using execve-‐stack as the shellcode to encode with your schema and execute
Study about the Egg Hunter shellcode Create a working demo of the Egghunter Should be configurable for different payloads
Create a `Shell_Reverse_TCP` shellcode