Let's take a look at the following steps:
- First, we need to start Shellter. To fire up Shellter, use the following command line:
# shellter
- Since we're total noobs for now, we'll use be using AutoMode here. Next, we need to identify the executable that we're going to backdoor. Note that only 32-bit executables are supported at this time.
Aside from ensuring that the executable is 32-bit, a best practice is to use an executable that is able to stand alone. Dependencies on proprietary DLLs often cause trouble. You should also verify that the program is considered clean by antivirus engines before you inject code into it; false positives are a reality of life in the antivirus world, and no amount ...