- Assignment 1
- Assignment 2
- Assignment 3
- Assignment 4
- Assignment 5
- Metasploit x64/xor encoder analysis
- Metasploit linux/x64/shell_reverse_tcp payload analysis
- Metasploit linux/x64/shell_bind_tcp payload analysis
- Assignment 6
- Polymorphic forkbomb x64 shellcode
- Polymorphic execve() x64 shellcode
- Polymorphic read file x64 shellcode
- Assignment 7
- GitHub
All I was seeking from doing this was to fill in the gaps in my knowledge. The course material was exceptional compared to my extremely basic assembly class at a Cal State, and it cost twenty times less. I liked that it makes you put your knowledge to the true test by completing 7 practical assignments of varying difficulty. I certainly have respect for others who have completed the certification.
Hi, could you give me your thoughts on SLAE64 vs SLAE32?
ReplyDeleteLets assume one already has some general (x86) assembly knowledge. For the purpose of shellcoding, wouldn't SLAE64 already cover most of the 32bit counterpart?
I know I'll have to perform 32bit shellcoding in a near future (OSCE), but can't help but feel it is much better value to just learn 64bit (as that is what future intel deployments would use; I am aware of the steeper learning-curve, my only concern is if I'll miss anything -- not difficulty).
BTW, very nice blog!
As x64 is almost a perfect superset of x86, you should be fine with just taking 64-bit. There are a couple highly useful instructions (such as pusha/popa) that are x86 only, but generally it is the same thing. Also, make sure you familiarize yourself with all of the x86 calling conventions. x64 calling conventions are completely different.
DeleteThanks! Will do :)
DeleteHello, I have one question regarding SecurityTube Training and PentesterAcademy, what is the difference in their courses? both look the same but im just curious if the SecurityTube course includes the exam/exercises and the PentesterAcademy just the videos for the course, thanks!
ReplyDelete