Metasploit shell codes in PE file [closed]
I am currently investigating how to find embedded shellcodes in PE files.
Can we find backdoored file using Metasploit?
Collaborate Disseminate
I am currently investigating how to find embedded shellcodes in PE files.
Can we find backdoored file using Metasploit?
I’m doing in static analysis of PE file.
Can PE file have two or more executable sections?
How can we detect whether it is injected or not?
I am doing research in identifying backdoors in Windows .exe files. Currently I found some methods to detect them:
String search in .exe
Find reference .dll and win32 API calls using import table
What are other static analysis methods … Continue reading static analysis for identifying backdoors in PE