[ExpDev] Shellcode Analysis

Msfvenom Shellcode Analysis

Today I will analyze the following shellcode generated by the msfvenom, specifically in linux/x86:

  • linux/x86/exec — Execute an arbitrary command
  • linux/x86/shell_bind_tcp — Listen for a connection and spawn a command shell
  • linux/x86/shell_reverse_tcp — Connect back to attacker and spawn a…

--

--

--

OSWE | OSCE | OSCP | CREST | Lead Offensive Security Engineer — All about Penetration Test, Red Team, Cloud Security, Web Application Security

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The MEW Attack: PolySwarm’s Take

DRM 101 — Introduction to DRM systems

How to root Walton Primo f3

Root android phone

Introduction to Cross-Site Request Forgery (CSRF)

{UPDATE} Test Cheater Hack Free Resources Generator

{UPDATE} Floating Underwater Car GELIK Hack Free Resources Generator

MyData Operator Status awarded to Mydex

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
bigb0ss

bigb0ss

OSWE | OSCE | OSCP | CREST | Lead Offensive Security Engineer — All about Penetration Test, Red Team, Cloud Security, Web Application Security

More from Medium

VulnHub’s SkyTower: A Walkthrough

Advent of Cyber 3: [Day 1] Save The Gifts

TryHackMe|Smag Grotto — Writeup

Previse Machine Walkthrough — HackTheBox