Description: The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders, decoders, crypters and other advanced low level applications.
This video is just a sample. To purchase the full course (9 HOURS of VIDEO MATERIAL) and view more sample videos, please use the link below:
http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/
Tags: assembly language , encoder , shellcode , linux , crypter , programming , tutorial , primer , basics , advanced , slae ,
Excelent vivek :)
Ah nice!
Have a look at:
http://www.phrack.org/issues.html?issue=61&id=11#article
Writing Unicode shellcode is very similar, because every send byte will be 0x00 and our shellcode has to "fix" this, but we can't use the full instruction set (because it must be valid unicode), this is not a trivial task :)
Would recommand that everybody reads this great articel :)
Thanks vivek for the video! Great work!
Hmm quick question line 29: inc edi
Why does it increase the memory location instead of increasing the actual hex value stored in edi? I assume it has to do with lea... is edi just storing a pointer?... maybe?
Eg.
mov cl, 10
inc cl
cl is now 11, correct? memory location is the same
Some clarification for my question, i assumed it would be:
inc [edi]
...or something to that nature