πŸ“”
Cyber Security Notes
search
⌘Ctrlk
πŸ“”
Cyber Security Notes
  • Introduction
  • CVEs
  • Paper Reviews
  • brain-circuitLarge Language Models
  • Security Basics Notes
  • Enumeration and Initial Compromise
  • Post Exploitation
  • Port Forwarding Cheatsheet
  • Powershell Essentials
  • Application Security
  • Linux 64-bit Assembly
    • GDB Basics
    • Basic Hello World Program
    • Registers in 64-bit
    • global directive
    • Reducing instructions and Removing NULL-> Optimizing memory in Assembly
    • Data Types
    • Endianness
    • Moving Data
    • push, pop, and the stack
    • Analysis - Writing data on memory location and referencing
    • Arithmetic Operations
    • Bitwise Logical Operations
    • Bit-Shifting Operations
    • Control Instructions
    • Loops
    • Procedures
    • Stack-Frames and Procedures
    • String Operations
    • Shellcoding basics
      • Introduction and Common Rules
      • Basic Shellcodes->Exit
      • Testing shellcode->Skeleton Code
      • Techniques-> JMP,CALL,POP
      • Techniques-> Stack
      • Techniques-> (64-bit only) RIP Relative Addressing
      • Shellcode 1 -> execve(/bin/sh) STACK PUSH
      • Shellcode 1 -> execve(/bin/sh) JMP CALL POP
      • Techniques-> XOR-Encoder
  • Cloud Security
  • API Security
  • Reverse Engineering
  • CTF Challenge Learnings
  • Applied Cryptography
  • Tools for everything
  • Openssl
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Linux 64-bit Assembly

Shellcoding basics

Some articles on creating shellcodes

Introduction and Common Ruleschevron-rightBasic Shellcodes->Exitchevron-rightTesting shellcode->Skeleton Codechevron-rightTechniques-> JMP,CALL,POPchevron-rightTechniques-> Stackchevron-rightTechniques-> (64-bit only) RIP Relative Addressingchevron-rightShellcode 1 -> execve(/bin/sh) STACK PUSHchevron-rightShellcode 1 -> execve(/bin/sh) JMP CALL POPchevron-rightTechniques-> XOR-Encoderchevron-right
PreviousString Operationschevron-leftNextIntroduction and Common Ruleschevron-right