Book Image

Offensive Shellcode from Scratch

By : Rishalin Pillay
5 (1)
Book Image

Offensive Shellcode from Scratch

5 (1)
By: Rishalin Pillay

Overview of this book

Shellcoding is a technique that is executed by many red teams and used in penetration testing and real-world attacks. Books on shellcode can be complex, and writing shellcode is perceived as a kind of "dark art." Offensive Shellcode from Scratch will help you to build a strong foundation of shellcode knowledge and enable you to use it with Linux and Windows. This book helps you to explore simple to more complex examples of shellcode that are used by real advanced persistent threat (APT) groups. You'll get to grips with the components of shellcode and understand which tools are used when building shellcode, along with the automated tools that exist to create shellcode payloads. As you advance through the chapters, you'll become well versed in assembly language and its various components, such as registers, flags, and data types. This shellcode book also teaches you about the compilers and decoders that are used when creating shellcode. Finally, the book takes you through various attacks that entail the use of shellcode in both Windows and Linux environments. By the end of this shellcode book, you'll have gained the knowledge needed to understand the workings of shellcode and build your own exploits by using the concepts explored.
Table of Contents (11 chapters)
1
Section 1: Shellcode
5
Section 2: Writing Shellcode
8
Section 3: Countermeasures and Bypasses

What this book covers

Chapter 1, The Ins and Outs of Shellcode, introduces you to shellcode. We will ensure you have a good understanding of what shellcode is, how it is used, and how to read its syntax.

Chapter 2, Assembly Language, focuses on assembly language. It will cover a number of aspects of assembly language, such as the following:

  • Registers and flags
  • Data types
  • Data movement instructions
  • Arithmetic instructions
  • Conditional instructions

Chapter 3, Shellcode Tools and Resources, focuses on the various compilers and tools that can be used with assembly language to create shellcode.

Chapter 4, Developing Shellcode for Windows, dives into the development of shellcode on Windows operating systems.

You will learn how to make use of different shellcode techniques to deploy shellcode within a program. The chapter will focus on the thought process around creating and deploying shellcode along with practical examples that you can perform in your own lab environment.

Chapter 5, Developing Shellcode for Linux, dives into the development of shellcode on Linux operating systems.

You will learn how to make use of different shellcode techniques to deploy shellcode within a program. The chapter will focus on the thought process around creating and deploying shellcode along with practical examples that you can perform in your own lab environment.

Chapter 6, Countermeasures and Bypasses, looks at the various countermeasures and bypasses for both Windows and Linux. The aim here is to sum up the book by discussing how software vendors have made advancements in mitigations against shellcode. However, on the flip side, we will cover how to bypass those countermeasures where possible.