📔
Cyber Security Notes
Ctrlk
  • Introduction
  • CVEs
  • Paper Reviews
  • Large Language Models
  • Security Basics Notes
  • Enumeration and Initial Compromise
  • Post Exploitation
  • Port Forwarding Cheatsheet
  • Powershell Essentials
  • Application Security
  • Linux 64-bit Assembly
    • GDB Basics
    • Basic Hello World Program
    • Registers in 64-bit
    • global directive
    • Reducing instructions and Removing NULL-> Optimizing memory in Assembly
    • Data Types
    • Endianness
    • Moving Data
    • push, pop, and the stack
    • Analysis - Writing data on memory location and referencing
    • Arithmetic Operations
    • Bitwise Logical Operations
    • Bit-Shifting Operations
    • Control Instructions
    • Loops
    • Procedures
    • Stack-Frames and Procedures
    • String Operations
    • Shellcoding basics
      • Introduction and Common Rules
      • Basic Shellcodes->Exit
      • Testing shellcode->Skeleton Code
      • Techniques-> JMP,CALL,POP
      • Techniques-> Stack
      • Techniques-> (64-bit only) RIP Relative Addressing
      • Shellcode 1 -> execve(/bin/sh) STACK PUSH
      • Shellcode 1 -> execve(/bin/sh) JMP CALL POP
      • Techniques-> XOR-Encoder
  • Cloud Security
  • API Security
  • Reverse Engineering
  • CTF Challenge Learnings
  • Applied Cryptography
  • Tools for everything
  • Openssl
Powered by GitBook
On this page

Was this helpful?

  1. Linux 64-bit Assembly

Shellcoding basics

Some articles on creating shellcodes

Introduction and Common RulesBasic Shellcodes->ExitTesting shellcode->Skeleton CodeTechniques-> JMP,CALL,POPTechniques-> StackTechniques-> (64-bit only) RIP Relative AddressingShellcode 1 -> execve(/bin/sh) STACK PUSHShellcode 1 -> execve(/bin/sh) JMP CALL POPTechniques-> XOR-Encoder
PreviousString OperationsNextIntroduction and Common Rules

Was this helpful?