Jump to content
Nytro

[RST] Writing shellcodes for Windows x64

Recommended Posts

Writing shellcodes for Windows x64

 

Long time ago I wrote three detailed blog posts about how to write shellcodes for Windows (x86 – 32 bits). The articles are beginner friendly and contain a lot of details. First part explains what is a shellcode and which are its limitations, second part explains PEB (Process Environment Block), PE (Portable Executable) file format and the basics of ASM (Assembler) and the third part shows how a Windows shellcode can be actually implemented.

 

This blog post is the port of the previous articles on Windows 64 bits (x64) and it will not cover all the details explained in the previous blog posts, so who is not familiar with all the concepts of shellcode development on Windows must see them before going further.

 

Of course, the differences between x86 and x64 shellcode development on Windows, including ASM, will be covered here. However, since I already write some details about Windows 64 bits on the Stack Based Buffer Overflows on x64 (Windows) blog post, I will just copy and paste them here.

 

As in the previous blog posts, we will create a simple shellcode that swaps the mouse buttons using SwapMouseButton function exported by user32.dll and grecefully close the proccess using ExitProcess function exported by kernel32.dll.

 

Articol complet: https://nytrosecurity.com/2019/06/30/writing-shellcodes-for-windows-x64/

  • Haha 1
  • Confused 1
  • Upvote 5
Link to comment
Share on other sites

Shellcode is a sequence of commands that a computer's processor executes when instructed to do so. A shellcode is used to execute an exploit on a target computer, with the goal of gaining access to the computer's resources. There are many types of shellcode, including those that inject malicious code into a running process, those that escalate privileges, and those that spawn a reverse shell to bypass firewalls. [EDIT]

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...