Webinar: Shellcode for the Masses

Register Now to Learn Shellcoding from the Ground Up!

In the art of binary exploitation, there is one ominous “hacker” term you will hear quite often: shellcode. What is shellcode? How can it be used, and how do exploit developers create it? These questions and others will be addressed by John Hammond, a cybersecurity practitioner and online training personality. Join us to watch and learn the use of shellcode against vulnerable programs in both Linux and Windows, explore how to simply generate shellcode in Python, and even how to evade bad character restrictions with sub-encoding techniques and how to apply them as a pentester, researcher, bug bounty hunter or CTF player in this FREE EH-Net Live! webinar on Wed Jan 29, 2020 at 1:00 PM EST. Join us live to receive certificates for easy submission of CPEs!

Please RT: https://twitter.com/ethicalhacker/status/1217515716188037121

First Name*

Last Name*

Email*

After registering, you’ll get 2 confirmation
emails from EH-Net AND GoToWebinar.

NOTE: Attendees ONLY also get Certificates of Attendance for easier submission of CPEs.

EH-Net Live! - Jan 2020 - Shellcode for the Masses - Hammond


Agenda for “Shellcode for the Masses”:

Note: Subject to Change
  • Intro by Don Donzal, EH-Net Editor-in-Chief
  • Bio – John Hammond
  • Presentation
    • What is Shellcode?
      • Actual definition
      • Usage and context
      • Bad character limitations
    • Why do we care?
      • Vulnerable programs
      • We can do this ourselves
      • This is a valuable skill
    • How do we learn this stuff?
      • vulnserver
      • exploit-db
      • The Shellcoder’s Handbook
    • Demo Time!!
      • Online resource: shellstorm
      • Creating our own: shellcraft
      • Evading Restrictions: sub-encoding
    • Where do we go from here?
  • Q&A
  • Post Game on EH-Net

Although this is a free event, registration is required. Our virtual doors to the webinar open 30 minutes before the scheduled start time. Feel free to invite your friends and colleagues!


EH-Net Live! Jan 2020 – Guest Bio

John Hammond is a cybersecurity instructor, developer, red teamer, and CTF enthusiast. Cyber Training Academy curriculum developer and teacher for the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He personally developed training material and infosec challenges for events such as PicoCTF and the “Capture the Packet” competition at DEFCON US. John speaks at security conferences such as BsidesNoVA, to students at colleges such as the University of North Carolina Greensboro, and other events like the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality to showcase programming tutorials, cyber security guides, and CTF video walkthroughs. John currently holds the following certifications: Security+, CEH, PCAP, OSCP, OSCE, and OSWE.

Ways to find John:

EH-Net Live! Jan 2020 - Shellcode for the Masses - John Hammond Pic

For videos and slide decks of all of our previous webinars, see the EH-Net Live! Archive.

Tags:
Viewing 6 reply threads
  • Author
    Posts
    • #174847
      Don Donzal
      Keymaster

      Register Now to Learn Shellcoding from the Ground Up!

      In the art of binary exploitation, there is one ominous “hacker” term you will hear quite often: shellcode. What is shellcode? How can it be used, and how do exploit developers create it? These questions and others will be addressed by John Hammond, a cybersecurity practitioner and online training personality. Join us to watch and learn the use of shellcode against vulnerable programs in both Linux and Windows, explore how to simply generate shellcode in Python, and even how to evade bad character restrictions with sub-encoding techniques and how to apply them as a pentester, researcher, bug bounty hunter or CTF player in this FREE EH-Net Live! webinar on Wed Jan 29, 2020 at 1:00 PM EST. Join us live to receive certificates for easy submission of CPEs!

      [See the full article at: Webinar: Shellcode for the Masses]

    • #174905
      pseudonymousbosch
      Participant

      Heads up, all. If you’re blocking ads & trackers via DNS, you won’t be able to register. Whitelist or turn it off for a minute and it’s fine.

    • #174921
      Don Donzal
      Keymaster

      Thanks for the heads up.

      Don

    • #175032
      Lyenn F. Moore
      Participant

      How can I register for this webinar?

    • #175074
      Don Donzal
      Keymaster

      Click this link and fill out the form. See you tomorrow!

      Webinar: Shellcode for the Masses

      Don

    • #175105
      kethmini
      Participant

      How to get a participate Certificate? I joined the live show

      • This reply was modified 5 months, 1 week ago by kethmini.
    • #175112
      Don Donzal
      Keymaster

      The certificates come directly from GoToWebinar, the platform we use for our events. They are automatically sent about 3 hours after the ending of live webinar. Unfortunately, we have no direct control over them. If you didn’t get it, you may want to check your spam/junk folder.

      Either way, thanks for attending,
      Don

Viewing 6 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?