Polymorphic shellcode: advances in recent years

Aleksander Czarnowski AVET

Polymorphic shellcode: advances in recent years

Polymorphic shellcode is no longer just a research topic - we see it on daily basis in IDS alerts. Recent development by black and white hat community resulted in great advance in penetration techniques, but it still probably the most uncovered area. In this paper I will examine some aids in creating exploits and polymorphic shellcode as well as detection techniques. I will also try to examine the impact of polymorphic shellcode used in penetration testing and real life attacks.

It is important to understand a role and risk associated with polymorphic shellcode, as malware and intrusion detection is in a phase of close integration. We've seen worms using exploits to infect vulnerable hosts. It's only a matter of time before polymorphic shellcode will be used by worm authors. The presentation covers mostly Unix/Linux systems and exploits.



twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.