Member-only story

Create Trojans with Windows Executables

ice-wzl
7 min readOct 11, 2021

--

This will be the first in a series of articles discussing various methods to backdoor everyday Windows executables, providing us with reverse shells to a target device. Having the ability to backdoor a normal executable affords us a better chance to remain undetected, juxtaposed to leaving an obvious shell.exe on the target host for long durations of time. What we will cover today starts, and remains at a basic level. In the future, I will delve into backdoored executables that can migrate processes upon execution as well as evade common Anti-Virus products.

Requirements and Shellter Installation

For this to be possible we will need our attack box (Kali Linux) and a Windows target box (Windows 10 Enterprise). The version of windows is unimportant as this will work with a variety of Windows kernel versions.

We will start by installing Shellter, a program that allows us to backdoor various Windows executables.

Figure 1.0
sudo apt upgrade -y

As always we begin with an apt-cache search for the program shelter to ensure our package name is correct. Upon seeing the results for shellter we will then…

--

--

ice-wzl
ice-wzl

Written by ice-wzl

Reverse Engineer, Red Teamer, CTF fan & creator

No responses yet