CaliSec/TIMLAB

InfoSec Study Group

  • Home
  • About Us
  • GitHub
  • LinkedIn
  • Twitter
CaliSec won Splunk Boss of the SOC Day 2019 (San Jose)
achievement

CaliSec won Splunk Boss of the SOC Day 2019 (San Jose)

Calisec Team won Splunk Boss of the SOC (BOTS) Day 2019 (San Jose)...

  • Tim Ip
    Tim Ip
1 min read
Code Cave
shellcode

Code Cave

To modify a Windows EXE file and save an altered version containing Trojan code in a new PE section without breaking the program.

  • Tim Ip
    Tim Ip
7 min read
SLAE Challenge 7: Custom Crypter
slae

SLAE Challenge 7: Custom Crypter

- Create a custom crypter like the one shown in the “crypters” video - Free to use any exisSng encrypSon schema - Can use any programming language

  • Tim Ip
    Tim Ip
4 min read
SLAE Challenge 6: Polymorphism
slae

SLAE Challenge 6: Polymorphism

- Take up 3 shellcodes from Shell-Storm and create polymorphic versions of them to beat paLern matching - The polymorphic versions cannot be larger 150% of the exisSng shellcode - Bonus points for making it shorter in length than original

  • Tim Ip
    Tim Ip
3 min read
SLAE Challenge 5C: Analyse linux/x86/shell_bind_tcp_random_port by libemu
slae

SLAE Challenge 5C: Analyse linux/x86/shell_bind_tcp_random_port by libemu

- Take up at least 3 shellcode samples created using Msfpayload for linux/x86 - Use GDB/Ndisasm/Libemu to dissect the funcSonality of the shellcode - Present your analysis

  • Tim Ip
    Tim Ip
4 min read
SLAE Challenge 5B: Analyse linux/x86/read_file by ndisasm
slae

SLAE Challenge 5B: Analyse linux/x86/read_file by ndisasm

- Take up at least 3 shellcode samples created using Msfpayload for linux/x86 - Use GDB/Ndisasm/Libemu to dissect the funcSonality of the shellcode - Present your analysis

  • Tim Ip
    Tim Ip
4 min read
SLAE Challenge 5A: Analyze linux/x86/adduser by GDB
slae

SLAE Challenge 5A: Analyze linux/x86/adduser by GDB

- Take up at least 3 shellcode samples created using Msfpayload for linux/x86 - Use GDB/Ndisasm/Libemu to dissect the funcSonality of the shellcode - Present your analysis

  • Tim Ip
    Tim Ip
5 min read
SLAE Challenge 4: Feedback XOR Encoder
slae

SLAE Challenge 4: Feedback XOR Encoder

Create a custom encoding scheme like the “Insertion Encoder” we showed you PoC with using execve-­‐stack as the shellcode to encode with your schema and execute

  • Tim Ip
    Tim Ip
4 min read
SLAE Challenge 3: Egghunter
slae

SLAE Challenge 3: Egghunter

Study about the Egg Hunter shellcode Create a working demo of the Egghunter Should be configurable for different payloads

  • Tim Ip
    Tim Ip
7 min read
SLAE Challenge 2: Shell_Reverse_Tcp
slae

SLAE Challenge 2: Shell_Reverse_Tcp

Create a `Shell_Reverse_TCP` shellcode

  • Tim Ip
    Tim Ip
4 min read
SLAE Challenge 1: Shell_Bind_Tcp
slae

SLAE Challenge 1: Shell_Bind_Tcp

Create a Shell_Bind_TCP shellcode

  • Tim Ip
    Tim Ip
6 min read
CaliSec/TIMLAB © 2019
Latest Posts Facebook Twitter Ghost