Previous

Demo Material – Endpoint Security Insights Workshop

This page provides selected demo material from the „Endpoint Security Insights – Shellcode Loaders & Evasion Fundamentals“ workshop.

 

Hands-on Preview

The demo material is intended to give you a practical preview of the workshop structure, depth, and teaching methodology. It includes selected excerpts from the original workbooks as well as representative code examples used during the training.

Please Note: This is not the complete workshop content, it represents just a very small part. The full course includes additional chapters, guided labs, instructor explanations, and in-depth discussions, all of which are available exclusively as part of the full workshop material.

================================================================================

================================================================================

Student Prerequisites

To work through the provided demo workshop material, you only need a small set of tools:

  • Windows development VM (e.g. Windows 10 and AV/EDR disabled)
  • Visual Studio 2022
  • x64dbg (debugger)
  • C2 / payload framework for generation and testing (commonly Meterpreter via Kali Linux)


Meterpreter (and Meterpreter-based shellcode) is not strictly required for the code exercises, but the workshop uses it consistently across labs and explanations. For that reason, it’s best to start with Meterpreter to follow the material as intended. Once you’re comfortable with the workflow and concepts, you can switch to alternative C2 frameworks such as Cobalt Strike, Brute Ratel, or others.

================================================================================

================================================================================

Ethical Use & Disclaimer 

The provided demo material is intended strictly for ethical, educational, and academic purposes. Its goal is to offer a small preview of the workshop “Endpoint Security Insights: Shellcode Loaders & Evasion Fundamentals” and to support learning and research in a responsible context.

Any use of this material for unlawful activity or malicious purposes is explicitly prohibited. I do not accept responsibility or liability for misuse of the content or for any damage resulting from improper or unauthorized use.

================================================================================

================================================================================

Demo Material Scope 

The demo material includes Bonus Chapter 5: Vectored Exception Handling (VEH). This chapter introduces Windows exception handling fundamentals and explains how VEH can be leveraged for controlled (shell)code execution through execution resumption. The demo provides the complete Chapter 5 content, including all associated workbooks as well as the required code samples for Visual Studio and step-by-step debugging with x64dbg. 

In the provided demo script, the main section about the chapter exception-handling starts on page 1112 and continues through page 1155.

In addition, the demo material contains selected core workbooks that are used throughout the workshop, such as creating Meterpreter shellcode and listeners, compiling and testing loaders, and preparing projects for debugging. These materials are intended to support participants in understanding the overall workflow and methodology used across the course.

The provided demo script also includes the complete table of contents from the full workshop material. This is meant to give you a clearer view of the overall structure, topics, and scope covered in the complete workshop. 

The demo script and the demo slides are shown below, and the code exercises for the corresponding chapter can be downloaded here. The archive is protected, for download and to unzip please use the password Infected!. Please do not upload or share the provided code on VirusTotal or similar platforms.

================================================================================

================================================================================

Learn More About the Workshop

For full details about the Endpoint Security Insights training formats, including scope, prerequisites, and delivery options, please visit:

👉 Training overview
👉 Option A – On-site training
👉 Option B – Self-paced training
👉 Deep dive workshop scope

If you have any questions about the course content, materials, or if you are unsure whether the course is right for you, feel free to contact me in advance at workshop@redops.at.

Happy Hacking!

Daniel Feichter

Last updated 24.01.26 07:54:21 24.01.26
Daniel Feichter