payload

Calling Home, Get Your Callbacks Through RBI
Authored By: Lance B. Cain and Alexander DeMineOverviewRemote Browser Isolation (RBI) is a security technology which has been gaining popularity for large businesses securing their enterprise networks in recent years. This blog ...

Linux X86 Assembly – How To Test Custom Shellcode Using a C Payload Tester
Travis Phillips | | ALSR, analysis, Application Security, architecture, ASM, cpu, debugging, DEP, function, gas, getpagesize, Hello World, Linux, mprotect, payload, Penetration Testing, pointers, Professionally Evil, programming, Reverse Engineering, Secure Ideas, shellcode, stub, syscalls, testing, training, x86
Overview In the last blog post in this series, we created a tool to make it easy to build our custom payloads and extract them. However, what if we want to test ...

Linux X86 Assembly – How to Make Our Hello World Usable as an Exploit Payload
Travis Phillips | | analysis, Application Security, architecture, ASM, call, cpu, exit, gas, Hello World, int, jmp, Linux, mov, objdump, optimize, payload, Penetration Testing, PoP, Professionally Evil, programming, push, Registers, Reverse Engineering, Secure Ideas, shellcode, syscalls, training, write, x86, xchg, xor
Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 assembly. While this can help us learn x86 assembly, it isn’t viable as a ...

Linux X86 Assembly – How to Build a Hello World Program in NASM
Travis Phillips | | analysis, Application Security, architecture, ASM, C++, cpu, exit, Hello World, int, Linux, mov, NASM, payload, Penetration Testing, Professionally Evil, programming, Registers, Reverse Engineering, Secure Ideas, shellcode, syscalls, write, x86
Overview A processor understands bytecode instructions specific to that architecture. We as humans use mnemonics to make building these instructions easier than remembering a bunch of binary codes. These mnemonics are known ...

A Hacker’s Tour of the X86 CPU Architecture
Travis Phillips | | analysis, Apple, architecture, ARM, cpu, eflags, Endian, M1, payload, Penetration Testing, Professionally Evil, Registers, Reverse Engineering, Reviews, Secure Ideas, segments, shellcode, x86
Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, laptops, and servers. While other architectures exist and are even taking some market share with mobile ...

Solving the November 13th Detective Nevil Mystery Challenge
Travis Phillips | | .gdb, ARM, ASM, challenge, debug, debugging, Detective Nevil Mystery Challenge, Linux, payload, Penetration Testing, Professionally Evil, programming, Pwntools, Reverse Engineering, Write-up
Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”. On November 13th of 2020, we released a challenge that contained a payload and it ...

Solving the November 13th Detective Nevil Mystery Challenge
Travis Phillips | | .gdb, ARM, ASM, challenge, debug, debugging, Detective Nevil Mystery Challenge, Linux, payload, Penetration Testing, Professionally Evil, programming, Pwntools, Reverse Engineering, Write-up
Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery Challenge”. On November 13th of 2020, we released a challenge that contained a payload and it ...

Reversing malware in a custom format: Hidden Bee elements
hasherezade | | custom malware, hidden bee, hidden bee miner, Malware, payload, Reverse Engineering, reversing malware, Threat analysis
When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable ...