Unconstrained Delegation

One of the weaknesses that I configured in my lab environment was “Unconstrained Delegation.” Systems in an Active Directory (AD) environment can be configured for unconstrained delegation. This means that a system can “delegate”, or impersonate users that authenticate to it. Normally, when a user authenticates to a service running on a system, the user…

ASX to MP3 Converter SEH Exploit

After completing my SLAE x86 certification, I wanted to begin my journey into exploit development. Several years ago, I had went through the excellent exploit development tutorials provided by Corelan and FuzzySecurity. Since then, I have forgotten almost everything and wanted to start over and go through these tutorials again. In addition to Corelan and…

SLAE Assignment #6 – Polymorphic Shellcode

The tasks for assignment 6 were: Take up 3 shellcodes from Shell-­‐Storm and create polymorphic versions of them to beat pattern matching The polymorphic versions cannot be larger 150% of the existing shellcode Bonus points for making it shorter in length than original Polymorphism, for purposes of this assignment, is to change some of the…

SLAE Assigment #5 – Metasploit Payload Analysis

The goals for assignment #5 were Take up at least 3 shellcode samples created using Msfpayload for linux/x86 Use GDB/Ndisasm/Libemu to dissect the functionality of the shellcode Present your analysis For this assignment, I decided to look at the shellcodes for the following metasploit payloads: linux/x86/adduser – adds a user to the system linux/x86/exec –…