In my previous post I created a windows reverse shell shellcode. The shellcode was dependent on the windows version as it contained hardcoded funcrion addresses. In order to create a version independent shellcode, we have to get the base address of kernel32.dll first, then we have to get the address of the LoadLibraryA and GetProcAddress functions….
Windows Reverse Shell Shellcode I.
In this post I will create a reverse shell shellcode for Win7. I use hardcoded addresses, so that this shellcode will not work with other Windows versions. In another post I will examine the way to create a version independent shellcode. The pseudo code of a Windows Reverse Shell: Initialize socket library with WSAStartup call…
- This blog is dedicated to my research and experimentation on ethical hacking. The methods and techniques published on this site should not be used to do illegal things. I do not take responsibility for acts of other people.
-
Recent Posts
Categories
- Android (5)
- Fusion (2)
- IoT (13)
- Main (3)
- Mobile (6)
- Protostar (24)
- SLAE32 (8)
- VulnServer (6)
- Windows Reverse Shell (2)