Backdooring Windows Executable Files

During the conduct of a recent penetration test, I needed to share a legitimate looking, yet decidedly malicious, executable with the client. There were multiple restrictions in place to create an authentic attack and as such, I was required to perform most of the work manually. After performing a quick…