What we will learn
Summary
Intrusion and shellcodes
Attack Scenario
What is a shellcode-based exploit ?
BOF
Shellcode Example
Shellcode insertion
Dealing with filters
Fooling NIDS
Limits of Current Shellcodes
Defeating Shellcodes (1)
Defeating Shellcodes (2)
Live Demo 1
Rethinking shellcodes
Abusing Current Security Systems with better Shellcodes
HZV Shellcode Generator
Live Demo 2
What about Worms ?
Contacts
Author: FozZy
E-mail: fozzy@dmpfrance.com
Homepage: http://www.dmpfrance.com/
Further information: Hackademy / Hackerz Voice Magazine