Quick howto on changing apt/apt-get's User-Agent string.
Review of SANS Webcast – Gearing up for 2019 – Best Practices to Consider
My review of the SANS webcast Gearing up for 2019 - Best Practices to Consider
Keeping Nmap Scan History
Logging nmap scans using bash/zsh functions.
packet_write_wait: Connection to X.X.X.X port 22: Broken pipe
How to fix packet_write_wait: Connection to X.X.X.X port 22: Broken pipe in VMWare Workstation guests.
Protected: Job Interview Blunders
There is no excerpt because this is a protected post.
Bypassing IPv4 Security Measures Using IPv6
Read about how one may take advantage of ipv6 neglect.
SLAE #7: Shellcode Crypter for Linux/x86
Introduction This blog series has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-877 To get the code provided in this exercise: % git clone https://github.com/droberson/SLAE.git The code will be within the Assignment-7 directory. RC4 I decided to use the RC4 algorithm due to the fact that …
SLAE #6: Polymorphic Shellcode for Linux/x86
Introduction This blog series has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-877 To get the code provided in this exercise: % git clone https://github.com/droberson/SLAE.git The code will be within the Assignment-6 directory. What is Polymorphic Shellcode? Quoting the Wikipedia article about Polymorphic Code directly: In …
Continue reading SLAE #6: Polymorphic Shellcode for Linux/x86
SLAE #5: Reverse Engineering Shellcode for Linux/x86
Introduction This blog series has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-877 To get the code provided in this exercise: % git clone https://github.com/droberson/SLAE.git The code will be within the Assignment-5 directory. Assignment Outline This particular assignment is to dissect three shellcodes from msfpayload using …
Continue reading SLAE #5: Reverse Engineering Shellcode for Linux/x86
SLAE #4: Encoding Shellcode for Linux/x86
Introduction This blog series has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-877 To get the code provided in this exercise: % git clone https://github.com/droberson/SLAE.git The code will be within the Assignment-4 directory. What is an Encoder? An encoder takes a set of data and transforms …
SLAE #3: Egg Hunters for Linux/x86
Introduction This blog series has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-877 To get the code provided in this exercise: % git clone https://github.com/droberson/SLAE.git The code will be within the Assignment-3 directory. What is an Egg Hunter? Egg hunter shellcodes are one example of a …
SLAE #2: Reverse Shell For Linux/x86
Introduction This blog series has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-877 To get the code provided in this exercise: % git clone https://github.com/droberson/SLAE.git The code will be within the Assignment-2 directory. The previous post outlined how the basics of writing shellcode and the prerequisite …