Description: Shellcode from public resources might not always be "ready for immediate use" - In many cases the author of the shellcode might have left placeholders for modification. If you do not know how to look into and make these modifications then the shellcode would be useless to you.
Here is one case: http://www.shell-storm.org/shellcode/files/shellcode-611.php
In this video, we first analyze the shellcode and see that it uses execve to run wget with the URL to download. The shellcode author has hardcoded the URL as "aaaa" which would be useless if you were a copy-paste person :)
We understand how the shellcode functions and use Python shortcuts to create the shellcode for the file name to download. This video is a quick and dirty guide to modifying shellcode :) Enjoy and Let me know your comments.
This free video is sponsored by SecurityTube Certifications: http://securitytube-training.com
Latest from the SecurityTube Blog: