February 2012
Intermediate to advanced
800 pages
23h 55m
English
In these labs, we’ll use what we’ve covered in Chapter 19 to analyze samples inspired by real shellcode. Because a debugger cannot easily load and run shellcode directly, we’ll use a utility called shellcode_launcher.exe to dynamically analyze shellcode binaries. You’ll find instructions on how to use this utility in Chapter 19 and in the detailed analyses in Appendix C.
Analyze the file Lab19-01.bin using shellcode_launcher.exe.
Q: | 1. How is the shellcode encoded? |
Q: | 2. Which functions does the shellcode manually import? |
Q: | 3. What network host does the shellcode communicate with? |
Q: | 4. What filesystem residue does the shellcode leave? |
Q: | 5. What does the shellcode do? |
The file Lab19-02.exe contains a piece of shellcode that ...