Skip to main content
Pentest Blog
  • Advisories
  • Operating System
  • Application Security
  • Network
  • Tools
  • Article Series
  • About Us

Tag: binary

Art of Anti Detection 2 – PE Backdoor Manufacturing

January 10, 2017January 31, 2017 Ege Balci 31 Comments

This paper will explain several methods used for placing backdoors in PE (Portable Executable) files for red team purposes, in order to fully grasp the content of this paper, readers needs to have at least intermediate x86 assembly knowledge, familiarity with debuggers and decent understanding of PE file format. Read More

PRODAFT Cyber Intelligence and Cyber Security Services

Recent Posts

  • Advisory | NetModule Router Software Race Condition Leads to Remote Code Execution
  • Advisory | Roxy-WI Unauthenticated Remote Code Executions CVE-2022-31137
  • Advisory | GLPI Service Management Software Multiple Vulnerabilities and Remote Code Execution
  • LiderAhenk 0day – All your PARDUS Clients Belongs To Me (CVE-2021-3825)
  • Pardus 21 Linux Distro – Remote Code Execution 0day 2021 CVE-2021-3806

Latest Comments

  • Ege Balci on Art of Anti Detection 3 – Shellcode Alchemy
  • Chase Run Taylor on Art of Anti Detection 1 – Introduction to AV & Detection Techniques
  • Mehmet İnce on Unexpected Journey #4 – Escaping from Restricted Shell and Gaining Root Access to SolarWinds Log & Event Manager (SIEM) Product
  • 0x00 on Unexpected Journey #4 – Escaping from Restricted Shell and Gaining Root Access to SolarWinds Log & Event Manager (SIEM) Product
  • Mehmet İnce on Unexpected Journey #4 – Escaping from Restricted Shell and Gaining Root Access to SolarWinds Log & Event Manager (SIEM) Product

Tags

0day 1day advisory alienvault android application assembly bof burp bypass crypter decoder dns EMET encoder exploit hook iat icmp in-memory IOT linux malware metasploit multi-stage nas packer php ransomware rce reflective research reverse reversing secure coding securityonion self-defence shellcode siem sql injection sqlmap stager storage tunneling windows

Awarded Top 15 Pentest Blog

Pentest Blogs
INVICTUS Cyber Security & Intelligence Services | Theme by Colorlib Powered by WordPress