Member-only story
This will be the first in a series of articles discussing various methods to backdoor everyday Windows executables, providing us with reverse shells to a target device. Having the ability to backdoor a normal executable affords us a better chance to remain undetected, juxtaposed to leaving an obvious shell.exe on the target host for long durations of time. What we will cover today starts, and remains at a basic level. In the future, I will delve into backdoored executables that can migrate processes upon execution as well as evade common Anti-Virus products.
Requirements and Shellter Installation
For this to be possible we will need our attack box (Kali Linux) and a Windows target box (Windows 10 Enterprise). The version of windows is unimportant as this will work with a variety of Windows kernel versions.
We will start by installing Shellter, a program that allows us to backdoor various Windows executables.
sudo apt upgrade -y
As always we begin with an apt-cache search for the program shelter to ensure our package name is correct. Upon seeing the results for shellter we will then…