Notes on an ASM X64 Reverse Shell
Notes an ASM X64 Reverse Shell
This article is a collection of Resources that i used to create a x64 reverse shell in pure ASM.
Furthermore you can find the code that I wrote commented line by line.
The Resources:
Windows X64 calling convention
The Steps:
- Finding Kernel32.dll Address
- Parsing Kernel32.dll to find GetProcAddress API
- Using GetProcAddress to find LoadLibrary API
- Loading the ws2_32.dll
- Using GetProcAddress to locate and store WSAStartup address
- Using GetProcAddress to locate and store WSASocketA address
- Using GetProcAddress to locate and store WSAConnect address
- Using GetProcAddress to locate and store CreateProcessA address
- Using GetProcAddress to locate and store ExitProcess address
- Calling WSAstartup()
- Calling WSASocketa()
- Creating the sockaddr structure
- Calling WSAConnect()
- Pushing cmd.exe string to stack
- Setting STARTUPINFOA Structure
- Calling CreateProcessA()
- Calling ExitProcess(0)
The Code:
You can find the fullcode here
Please DO NOT test the shell on VirusTotal et simila
Commenti
Posta un commento