Click here to start

Table of contents

What we will learn

Summary

Intrusion and shellcodes

Attack Scenario

What is a shellcode-based exploit ?

BOF

Shellcode Example

Shellcode insertion

Dealing with filters

Fooling NIDS

Limits of Current Shellcodes

Defeating Shellcodes (1)

Defeating Shellcodes (2)

Live Demo 1

Rethinking shellcodes

Abusing Current Security Systems with better Shellcodes

HZV Shellcode Generator

Live Demo 2

What about Worms ?

Contacts

Author: FozZy

E-mail: fozzy@dmpfrance.com

Homepage: http://www.dmpfrance.com/

Further information:
Hackademy / Hackerz Voice Magazine