To access material, start machines and answer questions login.
In this room, we'll explore how to build and deliver payloads, focusing on avoiding detection by common engines. We'll look at different techniques available to us as attackers and discuss the pros and cons of every one of them.
Objectives
- Learn how shellcodes are made.
- Explore the pros and cons of staged payloads.
- Create stealthy shellcodes to avoid detection.
Prerequisites
It is recommended to have some prior knowledge of how antivirus software works and a basic understanding of encryption and encoding. While not strictly required, some knowledge of basic assembly language can also be helpful. Also, we recommend having a basic understanding of reading code and understanding functions (C, C#).
Click and continue learning!
Ready to learn Cyber Security?
The AV Evasion: Shellcode room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
