Eshan Harshana AgalawattaObserve and Detection Methods of Backdoors in Windows executables (.exe Files)In cybersecurity backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures…7 min read·May 25, 2021----
Eshan Harshana AgalawattaPrimary Methods to Reverse Engineering PE Files (.exe Files)Revere engineering, also called back engineering is the process by which a man-made object is deconstructed to reveal its designs…6 min read·May 18, 2021----
Eshan Harshana AgalawattaAnalyzing Structure of Executable Programs (.exe files)Executable files execute code or a series of instructions contained in the file. The Portable Executable (PE) format is a file format for…4 min read·May 14, 2021----
Eshan Harshana AgalawattaAnalyzing Main Types of Backdoor Patterns in Windows PE FilesAccording to current technology era, there are mainly 3 types of backdoor patterns at the application level.5 min read·May 13, 2021----
Eshan Harshana AgalawattaAlternative Data Streams in NTFSAlternative Data Stream (ADS) support was added to NTFS (Windows NT, Windows 2000 and Windows XP) to help support Macintosh Hierarchical…4 min read·Jul 28, 2020----
Eshan Harshana AgalawattaRecover Image Files from Volatile Memory by Using PhotoRecRandom-Access Memory (RAM) is a volatile form of computer memory that can be read and changed in any order, typically used to store…2 min read·Jul 28, 2020----