Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Syscalls in Shellcode - Techniques for Malicious Functionality

Hack In The Box Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for utilizing Windows syscalls in shellcode during this in-depth conference talk. Delve into the challenges of using syscalls in Windows environments, including the portability problem associated with system service numbers (SSNs). Learn about ShellWasp, a tool designed to overcome these challenges and enable direct syscall usage in shellcode. Gain insights into the rarity of syscall implementation in Windows shellcode and understand the complexities involved in their execution. Witness demonstrations of shellcode comprised of multiple Windows syscalls, including an elaborate example utilizing 10 syscalls. Discover the nuances and gotchas of working with syscalls in shellcode compared to traditional WinAPI approaches. Examine how ShellWasp addresses portability issues and generates shellcode templates with labeled syscalls and parameters. Acquire a deep understanding of syscall mechanics in modern Windows operating systems, including Windows 7, 10, and 11. Uncover a novel method for invoking Windows syscalls in WoW64 environments, adding stealth to your code. Master this elite, state-of-the-art approach to shellcode development and expand your knowledge of advanced offensive security techniques.

Syllabus

#HITB2023AMS D1T2 - Syscalls In Shellcode: Techniques For Malicious Functionality - B. Brizendine

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Syscalls in Shellcode - Techniques for Malicious Functionality

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.