USA 2011 Weekend Training Session //July 30-31
USA 2011 Weekday Training Session //August 1-2
Register at http://www.blackhat.com/html/bh-us-11/training/miller-shellcode.html
I am pleased to announce that I been confirmed on the official Black Hat USA 2011 security conference program as a Trainer. I will be running a multi-day, high intensity training course, “The Shellcode Lab” to develop and understand shellcode in a hands-on environment. This is the second program appearance for me at Black Hat, where I previously presented my development of “Reverse DNS Tunneling Shellcode” in 2008.
If you don't like reading then you can check out the promo video that I created to get an overview of the course at http://www.youtube.com/watch?v=oY9cylPr2Bw ... This is embedded in the page at the end of this post.
So what is in the course?
Lets say you have found a vulnerable target. You throw your exploit at it with its default shellcode. You sit there with high hopes of compromising the system, but you don’t get a shell. So what happened? There is a good chance the victim machine failed to connect back to you with the pre-packaged shellcode.
Wouldn’t it be great if you could write your own shellcode to bypass security controls such as firewalls and authenticated proxies to increase your exploitation success rate? Well now you can!
Students will be provided with a “Virtual Shellcode Development Environment” that is designed to enable shellcode development across multiple platforms. Students will learn how to write shellcode for Linux, Mac 64-bit OSX and Windows. The development of the shellcode is presented using easy to learn techniques. Starting off with an introduction to different shellcoding techniques on each platform, an introduction to basic memory management and assembly, followed by creating simple shellcode to write to stdout and call functions. This gives students a base understanding and practical experience to develop simple shellcode.
The complexity is then increased to more useful shellcode such as command execution, dynamic Windows shellcode, setting up backdoor listeners using sockets, shellcode networking to remotely gain a command shell, and egg hunter shellcode to search through memory for our payload.
All of this is done whilst holding your hand so that you don’t miss a beat.
Students will also learn about staged-loading shellcode to bypass security controls such as firewalls and authenticated proxies, and kernel level shellcode to perform privilege escalation.
Students are taught how to encode their shellcode using the Metasploit Exploit Framework (MSF), and insert it into exploits that will be used to show that their shellcode was successfully executed. They will learn how to use MSF to generate shellcode for a variety of platforms, as well as how to integrate their shellcode into MSF so that it is available to all Metasploit exploits.
So should you attend?
Yes! Register at http://www.blackhat.com/html/bh-us-11/training/miller-shellcode.html
- Penetration Testers, Security Officers, Security Auditors, System Administrators and anyone else who wants to tune their elite security skills.
- Anyone who is interested in shellcoding, exploitation, vulnerabilities or Metasploit are prime candidates for this course. Students will be taught from scratch everything they need to know to complete this course successfully and walk away with a thorough knowledge and practical skills on how to create shellcode.
- This class is a great follow on course to “The Exploit Laboratory” and “The Exploit Laboratory: Black Belt”. These students will have learned a lot about exploitation, but are still limited to pre-packaged shellcode. This course lets you create custom shellcode to maximize exploitation success rates.
- Developers who want to learn low-level security development skills with shellcoding and assembly.
- Managers who want to gain a more in depth understanding of how systems can be compromised, how security controls can be bypassed both at the operating system level and network level, and how network access controls and intrusion prevention systems play a big part in preventing shellcode successfully connecting back to the attacker, and the general risks associated with your network security.
What experience do I need?
- Ability to work your way around Windows. If you don’t know how to “double-click” then you probably won’t find your way to the course anyway.
- Ability to work your way around Linux. Just the basic command line navigation.
- Ability to use a Linux text editor, such as vi, pico, joe, etc.
- Understand how to run a shell script.
- Understanding of basic assembly programming would be a huge bonus. If not don’t worry. The course is structured to hold your hand.