In my previous post I created a windows reverse shell shellcode. The shellcode was dependent on the windows version as it contained hardcoded funcrion addresses. In order to create a version independent shellcode, we have to get the base address of kernel32.dll first, then we have to get the address of the LoadLibraryA and GetProcAddress functions….
In this post I will create a reverse shell shellcode for Win7. I use hardcoded addresses, so that this shellcode will not work with other Windows versions. In another post I will examine the way to create a version independent shellcode. The pseudo code of a Windows Reverse Shell: Initialize socket library with WSAStartup call…
- This blog is dedicated to my research and experimentation on ethical hacking. The methods and techniques published on this site should not be used to do illegal things. I do not take responsibility for acts of other people.