Skip to main content
IT Fanatic
IT is a life long journey...

Main menu

  • About Me
  • Blog
  • Howto

You are here

Home

Main menu

  • About Me
  • Blog
  • Howto

Howto

  • The LAB
  • The LAB2
  • Linux
  • Powershell
  • Risk assessment
  • SLAE32 Linux Assembly Expert
    • SLAE32 Challenge #1 - Linux Bind Shell in Assembly
    • SLAE32 Challenge #2 - Linux Reverse Shell in Assembly
    • SLAE32 Challenge #3 - Linux egghunter Shellcode in Assembly
    • SLAE32 Challenge #4 - Linux shellcode encryption in Assembly
    • SLAE32 Challenge #5 - Linux x86 metasploit shellcode analysis
    • SLAE32 Challenge #6 - Polymorphic shellcodes
    • SLAE32 Challenge #7 - Cryptor
  • SPSE Python Security Expert
  • Windows
  • VmWare
  • VirtualBox
  • Firewall
  • Tools
  • Hack stuff
  • Raspberry PI

SLAE32 Linux Assembly Expert

Submitted by lenbal on Fri, 02/06/2015 - 14:44

This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification:

http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/

Student ID: SLAE-644

GitHub resource containing challenge files:

https://github.com/bl305/SLAE32

  • SLAE32 Challenge #1 - Linux Bind Shell in Assembly
  • SLAE32 Challenge #2 - Linux Reverse Shell in Assembly
  • SLAE32 Challenge #3 - Linux egghunter Shellcode in Assembly
  • SLAE32 Challenge #4 - Linux shellcode encryption in Assembly
  • SLAE32 Challenge #5 - Linux x86 metasploit shellcode analysis
  • SLAE32 Challenge #6 - Polymorphic shellcodes
  • SLAE32 Challenge #7 - Cryptor
SLAE32 Challenge #1 - Linux Bind Shell in Assembly ›