SLAE64 Assignment 6 - polymorphism

this time i choose three “uncommon” shellcode:

  • the first one changes hostname and shutdown (605)
  • the second one runs a bindshell using nc (822)
  • the third one is a shellcode created for SLAE64 (890)

i spent some time to try saving bytes, then i tried to hide syscall id to have a very cheap obfuscation.
because i already used ror/rol for my SLAE32, i tried to not use it that much.

shellcodes original url are:

i’m not discussing the morphism here, please look at .asm source code at https://github.com/gulyslae/SLAE64

SLAE64-1497 This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/

Written on September 7, 2019