10-18-2016, 09:18 PM
Yo.
So I was toying around with shellcode and figured this was something I may need at some point down the line.
I couldn't figure out a good way to store a byte array in a locally defined variable nicely, so I kinda had to hack it together, but still works none the less.
How it do:
1: Get Kernel32 offset
2: Invoke LoadLibraryA to load NtDll
3: RtlAdjustPrivileges
4: NtRaiseHardError
After that, I just disassembled the file and got the opcodes and made them into an array, and you can call it from whatever language you like!
MASM32:
Shellcode:
So I was toying around with shellcode and figured this was something I may need at some point down the line.
I couldn't figure out a good way to store a byte array in a locally defined variable nicely, so I kinda had to hack it together, but still works none the less.
How it do:
1: Get Kernel32 offset
2: Invoke LoadLibraryA to load NtDll
3: RtlAdjustPrivileges
4: NtRaiseHardError
After that, I just disassembled the file and got the opcodes and made them into an array, and you can call it from whatever language you like!
MASM32:
Hidden Content
Shellcode:
Hidden Content