SLAE64 extramile - hostname encoder/decoder
i like this method to obfuscate payloads because they never run on system that are not the real target.
the flow is very easy:
- get hostname using syscall sys_uname
- xor the shellcode using given value
- print or execute
code is far from clean, for example i’m reusing the same function twice.
i think i’ll work on this code again in the future, but not now.
you can find the code on my github
and an asciinema rec of it working here: https://asciinema.org/a/bYP8go6GpwgvW4IXAaCDCaB11
SLAE64-1497 This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/
Written on September 9, 2019