Register Now to Learn Shellcoding from the Ground Up!
In the art of binary exploitation, there is one ominous “hacker” term you will hear quite often: shellcode. What is shellcode? How can it be used, and how do exploit developers create it? These questions and others will be addressed by John Hammond, a cybersecurity practitioner and online training personality. Join us to watch and learn the use of shellcode against vulnerable programs in both Linux and Windows, explore how to simply generate shellcode in Python, and even how to evade bad character restrictions with sub-encoding techniques and how to apply them as a pentester, researcher, bug bounty hunter or CTF player in this FREE EH-Net Live! webinar on Wed Jan 29, 2020 at 1:00 PM EST. Join us live to receive certificates for easy submission of CPEs!
Please RT: https://twitter.com/ethicalhacker/status/1217515716188037121
Agenda for “Shellcode for the Masses”:
Note: Subject to Change
- Intro by Don Donzal, EH-Net Editor-in-Chief
- Bio – John Hammond
- Presentation
- What is Shellcode?
- Actual definition
- Usage and context
- Bad character limitations
- Why do we care?
- Vulnerable programs
- We can do this ourselves
- This is a valuable skill
- How do we learn this stuff?
- vulnserver
- exploit-db
- The Shellcoder’s Handbook
- Demo Time!!
- Online resource: shellstorm
- Creating our own: shellcraft
- Evading Restrictions: sub-encoding
- Where do we go from here?
- What is Shellcode?
- Q&A
- Post Game on EH-Net
Although this is a free event, registration is required. Our virtual doors to the webinar open 30 minutes before the scheduled start time. Feel free to invite your friends and colleagues!
EH-Net Live! Jan 2020 – Guest Bio
| John Hammond is a cybersecurity instructor, developer, red teamer, and CTF enthusiast. Cyber Training Academy curriculum developer and teacher for the Cyber Threat Emulation course, educating both civilian and military members on offensive Python, PowerShell, other scripting languages and the adversarial mindset. He personally developed training material and infosec challenges for events such as PicoCTF and the “Capture the Packet” competition at DEFCON US. John speaks at security conferences such as BsidesNoVA, to students at colleges such as the University of North Carolina Greensboro, and other events like the SANS Holiday Hack Challenge/KringleCon. He is an online YouTube personality to showcase programming tutorials, cyber security guides, and CTF video walkthroughs. John currently holds the following certifications: Security+, CEH, PCAP, OSCP, OSCE, and OSWE.
Ways to find John: |
![]() |
For videos and slide decks of all of our previous webinars, see the EH-Net Live! Archive.
Tags: 2020 binary ctf eh-net live! exploit highlight shellcode










