专注 APT 攻击与防御 - Micro8 系列教程项目地址:
https://github.com/Veil-Framework/Veil-Evasion
1、Veil-Evasion
Veil-Evasion 是与 Metasploit 生成相兼容的 Payload 的一款辅助框架,并可以绕过大多数的杀软。
Veil-Evasion 并没有集成在kali,配置 sources.list,可直接 apt-get。
root@John:~/Deskto#cat /etc/apt/sources.list#中科大deb http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contribdeb-src http://mirrors.ustc.edu.cn/kali kali-rolling main non-free contrib#阿里云#deb http://mirrors.aliyun.com/kali kali-rolling main non-free contrib#deb-src http://mirrors.aliyun.com/kali kali-rolling main non-free contrib#清华大学#deb http://mirrors.tuna.tsinghua.edu.cn/kali kali-rolling main contrib non-free#deb-src https://mirrors.tuna.tsinghua.edu.cn/kali kali-rolling main contrib non-free#浙大#deb http://mirrors.zju.edu.cn/kali kali-rolling main contrib non-free#deb-src http://mirrors.zju.edu.cn/kali kali-rolling main contrib non-free#东软大学#deb http://mirrors.neusoft.edu.cn/kali kali-rolling/main non-free contrib#deb-src http://mirrors.neusoft.edu.cn/kali kali-rolling/main non-free contrib#官方源deb http://http.kali.org/kali kali-rolling main non-free contribdeb-src http://http.kali.org/kali kali-rolling main non-free contrib#重庆大学#deb http://http.kali.org/kali kali-rolling main non-free contrib#deb-src http://http.kali.org/kali kali-rolling main non-free contrib
2、安装
root@John:~/Desktop# apt-get install veil-evasion
由于在实验中本机已经安装,所以我们在虚拟机中使用 git 方式来下载和安装。(以便截图)
ps:本次 kali 下截图使用 scrot
root@John:~/Deskto# apt-get install scrotroot@John:~/Deskto# scrot -s //即可root@John:~/Deskto# git clone https://github.com/Veil-Framework/Veil-Evasion.git

root@John:~/Veil-Evasion# ./setup.sh//安装漫长



3、测试
以 c/meterpreter/rev_tcp 为例:


ps:Veil-Evasion 不再更新,新版本项目地址:
https://github.com/Veil-Framework/Veil
4、附录:
[*] 可支持生成payloads:1) auxiliary/coldwar_wrapper2) auxiliary/macro_converter3) auxiliary/pyinstaller_wrapper4) c/meterpreter/rev_http5) c/meterpreter/rev_http_service6) c/meterpreter/rev_tcp7) c/meterpreter/rev_tcp_service8) c/shellcode_inject/flatc9) cs/meterpreter/rev_http10) cs/meterpreter/rev_https11) cs/meterpreter/rev_tcp12) cs/shellcode_inject/base64_substitution13) cs/shellcode_inject/virtual14) go/meterpreter/rev_http15) go/meterpreter/rev_https16) go/meterpreter/rev_tcp17) go/shellcode_inject/virtual18) native/backdoor_factory19) native/hyperion20) native/pe_scrambler21) perl/shellcode_inject/flat22) powershell/meterpreter/rev_http23) powershell/meterpreter/rev_https24) powershell/meterpreter/rev_tcp25) powershell/shellcode_inject/download_virtual26) powershell/shellcode_inject/download_virtual_https27) powershell/shellcode_inject/psexec_virtual28) powershell/shellcode_inject/virtual29) python/meterpreter/bind_tcp30) python/meterpreter/rev_http31) python/meterpreter/rev_http_contained32) python/meterpreter/rev_https33) python/meterpreter/rev_https_contained34) python/meterpreter/rev_tcp35) python/shellcode_inject/aes_encrypt36) python/shellcode_inject/aes_encrypt_HTTPKEY_Request37) python/shellcode_inject/arc_encrypt38) python/shellcode_inject/base64_substitution39) python/shellcode_inject/des_encrypt40) python/shellcode_inject/download_inject41) python/shellcode_inject/flat42) python/shellcode_inject/letter_substitution43) python/shellcode_inject/pidinject44) python/shellcode_inject/stallion45) ruby/meterpreter/rev_http46) ruby/meterpreter/rev_http_contained47) ruby/meterpreter/rev_https48) ruby/meterpreter/rev_https_contained49) ruby/meterpreter/rev_tcp50) ruby/shellcode_inject/base6451) ruby/shellcode_inject/flat
文章来源:《专注 APT 攻击与防御 - Micro8 系列教程》 - 书栈网 · BookStack