top of page
Writer's pictureInfosec In the City (IIC)

SINCON 2021 Conference — Implementation of One-Way Shellcoding in Windows 64-bit Systems

SINCON 2021 Conference — Workshop

Day 1 (05 Nov 2021) 11.30am—5.30pm @ Workshop Room — Max Capacity: 20 pax

Implementation of One-Way Shellcoding in Windows 64-bit Systems

Abstract

Generally, the traditional shellcodes generated by exploit frameworks like MSFvenom for reverse/bind shell do not work as expected when the vulnerable server is behind a firewall. As the firewall rules block all inbound and outbound connections to/from the server, except for the vulnerable service port, We can communicate only with the port used by the vulnerable service. The scenario is very challenging for penetration testers and red teams to obtain a shell from the server because connections to/from all other ports in the server are blocked.


The goal of the workshop is to construct and demonstrate a shellcode that will work with such firewall restrictions and provide a shell from the server behind the firewall.


Pre-Requisites/Reading


About Arnold Anthony & Sristi Lakshmi Sravana Kumar

ARNOLD ANTHONY is currently working as a Manager and has 7+ years of experience in information security. He is a security enthusiast who believes in sharing knowledge. He enjoys reverse engineering, pentesting, incident response, red/blue teaming, and scripting. In his free time, he does bug bounties and currently ranks amongst the top 350 researchers at Bugcrowd. He also holds the OSCP, OSCE, OSEE, OSWP, OSWE, CRTE, PACES certifications.


SRISTI LASKHMI SRAVANA KUMAR is a Security Analyst and has 5+ years of experience in the field of Cybersecurity. He holds a Master of Science degree in Electrical Engineering from the National University of Singapore (NUS) as well as holding CREST-CRT, OSCP, OSCE, and CRTE certifications. He is interested in offensive security topics like reverse engineering, exploit development, and malware analysis. He has co-authored several research papers on the topics of Embedded Device Security and Cybersecurity published in several international conferences and journals.

222 views0 comments

Comments


Post: Blog2_Post
bottom of page