Art of Anti Detection 2 – PE Backdoor Manufacturing

This paper will explain several methods used for placing backdoors in PE (Portable Executable) files for red team purposes, in order to fully grasp the content of this paper, readers needs to have at least intermediate x86 assembly knowledge, familiarity with debuggers and decent understanding of PE file format. Introduction Nowadays almost all security researchers, … Continue reading Art of Anti Detection 2 – PE Backdoor Manufacturing