Kwelwild Posted February 24, 2013 Report Posted February 24, 2013 Description: A lot of times we download shellcode from sites like [ Shell-Storm.org ] | Home | and http://exploit-db.com but have no clue what that do. We believe what the shellcode description says and we are happy to run it. Would you trust a hacker? In this video, we look at the first step on how to systematically run and analyze shellcode.In course of this video, we will discover that the shellcode in question uses a JMP-CALL-POP technique and uses XOR encoding to hide the real shellcode. We then move on to find the two syscalls it makes setreuid and execve. Upon analysis of the arguments of the syscall, we figure out that the shellcode after decoding itself, runs "/bin/ksh"Link to Shellcode: Linux/x86 - setreuid (0,0) & execve(/bin/ksh, [/bin/ksh, NULL]) + XOR encoded - 53 bytesShellcode Author: https://twitter.com/@egeektronic Surs?: Hack Of The Day: How Do I Run Untrusted Shellcode? 1 Quote