Главная
Study mode:
on
1
Intro
2
Welcome
3
Assumptions
4
About Brent
5
Main Motivation
6
Embedded Exploitation
7
Giant Robot Spider Project
8
Building a Workshop
9
Starting from the Beginning
10
What is Meterpreter
11
Interpreters
12
Bourne Shell
13
Why did someone need it
14
Under the Radar
15
Breaking Point
16
Custom Hardware
17
Full Chain
18
Embedded Pilot Collection
19
Exploitation
20
Shell Code
21
Position Independent Executable
22
Initial Stack
23
Auxiliary Vector
24
Linux
25
Solaris
26
Windows
27
Other payloads
28
LibbyNet
29
DoNotCigar
30
OpenSSL
31
Bed TLS
32
Curl
33
Payload
34
System Detection
35
Compatibility Layers
36
Limit H
37
CRT
38
Conditional Compilation
39
ObjectOriented C
40
Working Directory
41
Event Loop
42
Magic Thread Pool
43
The Bug
44
Old CPUs
45
Make files
46
Exploit
47
Delete old code
48
New implementation
49
Other features
50
Whats next
51
Have a need
52
Demos
53
Getting Started
54
Clean Up
55
Build Curl
56
Multi Payload
57
Reverse HTTP
58
Help Screen
59
Debug
60
Automate
Description:
Explore the intricacies of designing and implementing a universal Meterpreter payload in this 52-minute conference talk from NolaCon 2017. Delve into embedded exploitation, the Giant Robot Spider Project, and the fundamentals of Meterpreter. Learn about interpreters, shell code, position-independent executables, and various payload systems across Linux, Solaris, and Windows platforms. Discover techniques for system detection, compatibility layers, and object-oriented C programming. Gain insights into event loops, magic thread pools, and addressing challenges with older CPUs. Conclude with practical demos on building multi-payloads, reverse HTTP, and debugging techniques, equipping you with essential knowledge for advanced payload development and exploitation.

Designing and Implementing a Universal Meterpreter Payload

Add to list