-
Recent Posts
- Shellcode: Windows on ARM64 / AArch64
- Delegated NT DLL
- WOW64 Callback Table (FinFisher)
- Shellcode: Linux on RISC-V 64-Bit
- MiniDumpWriteDump via COM+ Services DLL
- Shellcode: In-Memory Execution of JavaScript, VBScript, JScript and XSL
- Shellcode: In-Memory Execution of DLL
- Shellcode: Loading .NET Assemblies From Memory
- Shellcode: A reverse shell for Linux in C with support for TLS/SSL
- How the L0pht (probably) optimized attack against the LanMan hash.
Category Archives: shellcode
Shellcode: Windows on ARM64 / AArch64
Introduction Back in October 2018, I wanted to write ARM assembly on Windows. All I could acquire then was a Surface tablet running Windows RT that was released sometime in October 2012. Windows RT (now deprecated) was a version of … Continue reading
Shellcode: In-Memory Execution of JavaScript, VBScript, JScript and XSL
Introduction A DynaCall() Function for Win32 was published in the August 1998 edition of Dr.Dobbs Journal. The author, Ton Plooy, provided a function in C that allows an interpreted language such as VBScript to call external DLL functions via a … Continue reading
Posted in assembly, programming, security, shellcode, windows
Tagged assembly, javascript, jscript, perl, python, shellcode, vbscript, x86
Leave a comment
Shellcode: In-Memory Execution of DLL
Introduction In March 2002, the infamous group 29A published their sixth e-zine. One of the articles titled In-Memory PE EXE Execution by Z0MBiE demonstrated how to manually load and run a Portable Executable entirely from memory. The InMem client provided … Continue reading
Posted in assembly, injection, programming, security, shellcode, windows
Tagged DLL, EXE, in-memory, x86 assembly
4 Comments
Shellcode: Loading .NET Assemblies From Memory
Introduction The dot net Framework can be found on almost every device running Microsoft Windows. It is popular among professionals involved in both attacking (Red Team) and defending (Blue Team) a Windows-based device. In 2015, the Antimalware Scan Interface (AMSI) … Continue reading
Posted in assembly, encryption, malware, programming, security, shellcode, windows
Tagged .net, c++, donut, dotnet, jscript, powershell, vbscript
2 Comments
Shellcode: A reverse shell for Linux in C with support for TLS/SSL
Shellcode: A reverse shell in C for Linux with support for TLS/SSL Introduction History Definitions Position-independent code (PIC) Position-independent executable (PIE) Thread Local Storage or Transport Layer Security (TLS) Address Space Layout Randomization (ASLR) Executable and Link Format (ELF) Base … Continue reading