Chapter 9. Shellcode Strategies
This chapter discusses various factors you may need to consider when designing or selecting a payload for your exploits. The following topics will be covered
User space shellcode
System calls
Basic shellcode
Port binding shellcode
Reverse connect shellcode
Find socket shellcode
Command execution shellcode
File transfer shellcode
Multi-stage shellcode
System call proxy shellcode
Process injection shellcode
Shellcode encoding
Shellcode corruption
Disassembling shellcode
In Chapters 7 and 8, you were introduced to the idea of shellcode and shown how it is used in the process of exploiting a vulnerable computer program. Reliable shellcode is at the heart of virtually every exploit that results in “arbitrary code execution,” a ...
Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.