Observe and Detection Methods of Backdoors in Windows executables (.exe Files)In cybersecurity backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures…May 25, 2021May 25, 2021
Primary Methods to Reverse Engineering PE Files (.exe Files)Revere engineering, also called back engineering is the process by which a man-made object is deconstructed to reveal its designs…May 18, 2021May 18, 2021
Analyzing Structure of Executable Programs (.exe files)Executable files execute code or a series of instructions contained in the file. The Portable Executable (PE) format is a file format for…May 14, 2021May 14, 2021
Analyzing Main Types of Backdoor Patterns in Windows PE FilesAccording to current technology era, there are mainly 3 types of backdoor patterns at the application level.May 13, 2021May 13, 2021
Alternative Data Streams in NTFSAlternative Data Stream (ADS) support was added to NTFS (Windows NT, Windows 2000 and Windows XP) to help support Macintosh Hierarchical…Jul 28, 2020Jul 28, 2020
Recover Image Files from Volatile Memory by Using PhotoRecRandom-Access Memory (RAM) is a volatile form of computer memory that can be read and changed in any order, typically used to store…Jul 28, 2020Jul 28, 2020