Category: Windows Reverse Shell

Windows Reverse Shell Shellcode II.

In my previous post I created a windows reverse shell shellcode. The shellcode was dependent on the windows version as it contained hardcoded funcrion addresses. In order to create a version independent shellcode, we have to get the base address of kernel32.dll first, then we have to get the address of the LoadLibraryA and GetProcAddress functions….

Windows Reverse Shell Shellcode I.

In this post I will create a reverse shell shellcode for Win7. I use hardcoded addresses, so that this shellcode will not work with other Windows versions. In another post I will examine the way to create a version independent shellcode.   The pseudo code of a Windows Reverse Shell: Initialize socket library with WSAStartup call…