In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode.
Questions tagged [shellcode]
231 questions
-1
votes
1 answer
What does ((void (*) ())shellcode) () do, where shellcode is an unsigned char array?
#include
unsigned char random[] = //randomness
unsigned char shellcode[] = //shellcode in hex
int main(void)
{
((void (*) ())shellcode) ();
}
What does ((void (*) ())shellcode) (); do?
![](../../users/profiles/99052.webp)
Mark Read
- 199
- 1
- 1
- 6
-1
votes
1 answer
During a penetration test, when is it preferable to use reverse HTTP payload and when reverse TCP payload?
I'm using Veil Evasion and Metasploit.
![](../../users/profiles/104918.webp)
HenryC
- 31
- 3
-1
votes
1 answer
Understanding HTTP response from Linux Server
I am working through a question that involves someone using a vulnerability in a Linux server in order to gain access to it. The first part of the question states
In monitoring the network activity between a critical Goldmine Tech web server and…
![](../../users/profiles/88653.webp)
Josh
- 119
- 2
-2
votes
1 answer
What is the language below and where can I learn it?
As I am subscribed to the Exploit-DB Twitter feed, I see many exploits with code looking like this:
\x3c\x68\x74\x6d\x6c\x3e\x0d\x0a\x3c\x6d\x65\x74\x61\x20\x68\x74\x74\x70\x2d\x65\x71\x75\x69\x76
I know this is used as a buffer overflow attack but,…
![](../../users/profiles/73590.webp)
Lubbers
- 1
-2
votes
2 answers
Cannot get simple shellcode runner to work
I'm just trying to execute shellcode directly from the command line. I send a simple 0x90 NOP and get a segmentation fault?
root@server:~# gcc shellcode.c -o shellrun -fno-stack-protector -z execstack
root@server:~# ./shellrun `perl -e 'print…
![](../../users/profiles/61602.webp)
anonymous
- 21
- 5
-4
votes
1 answer
Why is my reverse_https payload running at 0.0.0.0:443?
I created a reverse_https backdoor ( windows/meterpreter/reverse_https ) with msfpayload. Now I want to create a reverse shell from my target with a multi handler.
The problem is that when I exploited the handler I see that it ran at 0.0.0.0:443 !…
![](../../users/profiles/73482.webp)
unbl0ck3r
- 159
- 2
- 7