shimsam Posted May 6, 2016 Share Posted May 6, 2016 Hi.. First post. Hope i dont break any rules.. I was playing around with Metasploit, and i wanted to get my hands on way to avoid AV. So i trid cryptes and they maybe good but not great. I saw a video "DerbyCon 3 0 3202 Antivirus Evasion Lessons Learned Thelightcosine". I didn't just skipped to the end to get my answers which is how can i get my payloads FUD. Cause i enjoyed the video. Well.. So i understood it was or paying 5000$ a year for metasploit pro and get my hands on Dynamic Payloads , or learn to code and make myself my own reverse tcp script that will be FUD . But i dont have the money ot the skillz . So i gave it up. No im joking.. I found a python script online. Its a server script, that doing the lisening to the port and client script thats making the reverse tcp connection. Its working and all but there is no point in just having connection to windows command line. Metasploit have all those goodies that i can use... But the problem is that when i run it(client script), i cant have it connect back to metasploid, only to the python "server" script. BTW i can have it connect to netcat but the connection allso break when i run a command like "cd c:\" I looked at the code and tried figuring out why, but the only reason i can think of is that netcat and metasploit are supposed to be used with there own scripts. But i hope there is way.. is there??? Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.