POP POP RETN ; An Introduction to Writing Win32 Shellcode

POP POP RETN ; An Introduction to Writing Win32 Shellcode

If you have ever worked with an exploit or Metasploit, you have probably used shellcode, but do you know how it is made? This talk has been designed to walk you through the ins and outs of basic shellcode, with a focus on Windows and the x86 architecture. There will be a review of the basic computer science behind shellcode, a look under the hood of msfvenom works and how you can recreate msfvenom's shellcode in Assembly, and then a walkthrough and a demo of how you can create a custom connectback stager using Assembly.

Presented by