Fully undetectable backdooring PE file

Table of Contents1 Introduction2 Self Imposed Restrictions for¬†backdooring PE file3 Methods used:4 Criteria for PE file selection for implanting backdoor4.1 ASLR: 4.2 Static Analysis5 Backdooring PE file6 Adding a new Section header method6.1 Hijack Execution Flow6.2 Adding Shellcode6.3 Modifying shellcode6.4 Spawning shell6.5 Pros of adding a new section header method6.6 Cons of adding a new … Continue reading Fully undetectable backdooring PE file