

ld Reverse-Shell-Safe.o -o Reverse-Shell-Safe nasm -f elf64 Reverse-Shell-Safe.nasm -o Reverse-Shell-Safe.o Source code of Reverse-Shell-Safe.nasm : This shellcode has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification : Jne exit jump out of loop if they are not the same connect(sock, (struct sockaddr *)&server, sockaddr_len)


copy socket descriptor to rdi for future use Passcode_required_size equ $ - passcode_required ld Reverse-Shell-Passcode-Safe.o -o Reverse-Shell-Passcode-Safe nasm -f elf64 Reverse-Shell-Passcode-Safe.nasm -o Reverse-Shell-Passcode-Safe.o Source code of Reverse-Shell-Passcode-Safe.nasm This shellcode has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification : So I’ve chosen to use a substraction in order to have the same result : mov dword, 0x0100007fįull source code is available here and on my Github account. At some points the original code contains some 0x00 like here : mov dword, 0x0100007f The passcode code part is exactly the same as the one described in Assignment#1 Here are the opcodes of this shellcode, as you can see there are no 0x00 : The reverse TCP shellcode open a connection on port 4444 and then we access to the /bin/sh shell ! The aim of this assignment is to create a shell reverse TCP shellcode with a passcode and to remove all 0x00 from opcodes.įirst, we need to listen to incoming connections on port 4444 : /online-courses/x8664-assembly-and-shellcoding-on-linux/index.html This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification :
