This will be the first in a series of articles discussing various methods to backdoor everyday Windows executables, providing us with reverse shells to a target device. Having the ability to backdoor a normal executable affords us a better chance to remain undetected, juxtaposed to leaving an obvious shell.exe on the target host for long durations of time. What we will cover today starts, and remains at a basic level…