dr.t3rr0r
Official Website


today : Friday, April 18, 2025 | at : | safemode : ON
> / home / terror / public_html /
name author perms com modified label

Handbook about Crypters and Binders dr.t3rr0r rwxr-xr-x 0 3:06 AM

Filename Handbook about Crypters and Binders
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 3:06 AM
Label
Action
 Crypter - to encrypt (to conceal information by means of a code or cipher)

 Binder - any construct that binds a variable to a value (or type, etc.)


Handbook about Crypters and Binders

Contents:

Quote
1 Preface
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Target audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2 Packer 
2.1 Packer classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Binder, joiner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

3 Malware detection by antivirus scanners
3.1 Signature based detection . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2 Heuristic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

4 Inner workings of a binder 
4.1 Portable Executable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2 Using the overlay of the PE . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.3 Embedding files into the resource section . . . . . . . . . . . . . . . . . . . 13
4.4 Other PE binding techniques . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.5 Binding techniques for other file formats . . . . . . . . . . . . . . . . . . . 14

5 Inner workings of a crypter 
5.1 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.2 Oligomorphic, polymorphic and metamorphic . . . . . . . . . . . . . . . . 17
5.3 Unique stub generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5.4 Obfuscation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.5 Scantime and runtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.6 Resulting file size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.7 Undetection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

6 License and contact
6.1 License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.2 Contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Bibliography
Download:
http://goo.gl/yV9tKZ










Contents:
Quote
1 Preface
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Target audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Packer
2.1 Packer classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Binder, joiner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3 Malware detection by antivirus scanners
3.1 Signature based detection . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2 Heuristic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 Inner workings of a binder
4.1 Portable Executable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2 Using the overlay of the PE . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.3 Embedding files into the resource section . . . . . . . . . . . . . . . . . . . 13
4.4 Other PE binding techniques . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.5 Binding techniques for other file formats . . . . . . . . . . . . . . . . . . . 14
5 Inner workings of a crypter
5.1 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5.2 Oligomorphic, polymorphic and metamorphic . . . . . . . . . . . . . . . . 17
5.3 Unique stub generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5.4 Obfuscation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.5 Scantime and runtime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.6 Resulting file size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
5.7 Undetection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6 License and contact
6.1 License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.2 Contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Bibliography
Download:
http://goo.gl/yV9tKZ

Credit To Him 

0 comments:

Post a Comment

 

Template © IT is Unknown! Use To Learn ! Learn to Hack ! Hack to Learn ! Hack to Use ! | by dr.t3rr0r |
VB (Vio b374k) Template design by dr.t3rr0r