In the art of binary exploitation, there is one ominous “hacker” term you will hear quite often, and that is shellcode. What is shellcode? How do exploit developers create it and how do ethical hackers use it in their pentests, for research or even in CTF competitions? These questions and others will be addressed by our guest, John Hammond, a cybersecurity practitioner and online training personality. Together we’ll do our best to show you how to use shellcode against vulnerable programs in both Linux and Windows, explore how to generate shellcode in Python, and eventually get to the hacker holy grail… an interactive shell on the host machine within the organization that we’ll be pretending to pentest. All this and more in this FREE EH-Net Live! webinar that was presented on Wed Jan 29, 2020.