Chapter 9. Shellcode Strategies

This chapter discusses various factors you may need to consider when designing or selecting a payload for your exploits. The following topics will be covered

  • User space shellcode

  • System calls

  • Basic shellcode

  • Port binding shellcode

  • Reverse connect shellcode

  • Find socket shellcode

  • Command execution shellcode

  • File transfer shellcode

  • Multi-stage shellcode

  • System call proxy shellcode

  • Process injection shellcode

  • Shellcode encoding

  • Shellcode corruption

  • Disassembling shellcode

In Chapters 7 and 8, you were introduced to the idea of shellcode and shown how it is used in the process of exploiting a vulnerable computer program. Reliable shellcode is at the heart of virtually every exploit that results in “arbitrary code execution,” a ...

Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.