субота, 8. август 2015.

Bypass AV USE PowerShell method using a batch file

Bypass AV USE PowerShell method using a batch file



  The penetration testing is the first step we can bypass the AV and make our FUD useful
We can get around this by using AV Veil.At that time we used python module.In veil there are four types paiload.C​​, C #, Python, and PowerShell. They now use PowerShell module.








cd / pentest / exploits / set /
./set


Then give your IP & Port to connect a reverse shell.



Now in the figures you can see that it has been generated & stored in the / root / .set / reports / powershell. And we also start metasploit listener.If victim paste our payload generated in cmd then we can get meterpreter shell. But i think it's hard to tell someone to copy & paste 
something into cmd. So we will create a batch file of our payload.


Create Batch File Of Our Payload




(1) open x86_powershell_injection.txt file from / root / .set / reports / powershell.
(2) Add path of powershell in first line. For example your code is starting from powershell word just put C: \ \ windows/system32/windowspowershell/v1.0 / before it.
(3) Copy all code from x86_powershell_injection.txt
(4) Create new file & paste code

(5) Save this file as. Extention bat and send to victim.

0 коментара:

Постави коментар

Омогућава Blogger.