February 2012
Intermediate to advanced
800 pages
23h 55m
English
Shellcode can be found in a variety of sources, including network traffic, web pages, media files, and malware. Because it is not always possible to create an environment with the correct version of the vulnerable program that the exploit targets, the malware analyst must try to reverse-engineer shellcode using only static analysis.
Malicious web pages typically use JavaScript to profile a user’s system and check for
vulnerable versions of the browser and installed plug-ins. The JavaScript unescape is typically used to convert the encoded shellcode text into a binary package
suitable for execution. Shellcode is often stored as an encoded text string included with the script
that triggers the exploit.
The encoding understood by ...