Open in app
Home
Notifications
Lists
Stories

Write
Eshan Harshana Agalawatta
Eshan Harshana Agalawatta

Home

May 25, 2021

Observe and Detection Methods of Backdoors in Windows executables (.exe Files)

In cybersecurity backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high-level user access (a.k.a root access) on a computer system, network or software application. we can divide backdoors into three main types in windows PE files. (PE…

Information Technology

7 min read

Observe and Detection Methods of Backdoors in Windows executables (.exe Files)
Observe and Detection Methods of Backdoors in Windows executables (.exe Files)

May 18, 2021

Primary Methods to Reverse Engineering PE Files (.exe Files)

Revere engineering, also called back engineering is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object. In reverse engineering, there are 5 major steps. Software reverse engineering is the process of discovering the technological principles of a system…

Windows

6 min read

Primary Methods to Reverse Engineering PE Files (.exe Files)
Primary Methods to Reverse Engineering PE Files (.exe Files)

May 14, 2021

Analyzing Structure of Executable Programs (.exe files)

Executable files execute code or a series of instructions contained in the file. The Portable Executable (PE) format is a file format for executables in Microsoft Windows. The PE format is used by Windows 95 and higher, Windows NT 3.1 and higher .exe is a common filename extension denoting an…

Exe

4 min read

Analyzing Structure of Executable Programs (.exe files)
Analyzing Structure of Executable Programs (.exe files)

May 13, 2021

Analyzing Main Types of Backdoor Patterns in Windows PE Files

According to current technology era, there are mainly 3 types of backdoor patterns at the application level. Hard-Coded Credentials These backdoors are creating by hard coding credentials like usernames, passwords, logics, secret keys, and IP/URLs are in the source code. Most of the time lazy developers add hard-coded administration/master usernames and passwords…

Hacking

5 min read

Analyzing Main Types of Backdoor Patterns in Windows PE Files
Analyzing Main Types of Backdoor Patterns in Windows PE Files

Jul 28, 2020

Alternative Data Streams in NTFS

Alternative Data Stream (ADS) support was added to NTFS (Windows NT, Windows 2000 and Windows XP) to help support Macintosh Hierarchical File System (HFS) which uses resource forks to store icons and other information for a file. ADS provide the ability to put data into existing files and folders without…

Cybersecurity

4 min read

Alternative Data Streams in NTFS
Alternative Data Streams in NTFS

Jul 28, 2020

Recover Image Files from Volatile Memory

Random-Access Memory (RAM) is a volatile form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A computer’s RAM stores data for short-term use. RAM works in conjunction with the hard drive, which takes care of long-term storage…

Digital Forensics

2 min read

Recover Image Files from Volatile Memory by Using PhotoRec
Recover Image Files from Volatile Memory by Using PhotoRec
Eshan Harshana Agalawatta

Eshan Harshana Agalawatta

Experienced, Innovative Software Engineer

Following
  • Daniel Kreider

    Daniel Kreider

  • Amrelsher

    Amrelsher

  • Netflix Technology Blog

    Netflix Technology Blog

  • Sabrina Carpenter 🐍

    Sabrina Carpenter 🐍

  • Vikram Gupta

    Vikram Gupta

See all (21)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable