Bypass AV USE PowerShell method using a batch file
The penetration testing is the first step we can bypass the AV and make our FUD useful
We can get around this by using AV Veil.At that time we used python module.In veil there are four types paiload.C, C #, Python, and PowerShell. They now use PowerShell module.
cd / pentest / exploits / set /
./set
Then give your IP & Port to connect a reverse shell.
Now in the figures you can see that it has been generated & stored in the / root / .set / reports / powershell. And we also start metasploit listener.If victim paste our payload generated in cmd then we can get meterpreter shell. But i think it's hard to tell someone to copy & paste
something into cmd. So we will create a batch file of our payload.
Create Batch File Of Our Payload
(1) open x86_powershell_injection.txt file from / root / .set / reports / powershell.
(2) Add path of powershell in first line. For example your code is starting from powershell word just put C: \ \ windows/system32/windowspowershell/v1.0 / before it.
(3) Copy all code from x86_powershell_injection.txt
(4) Create new file & paste code
(5) Save this file as. Extention bat and send to victim.
The penetration testing is the first step we can bypass the AV and make our FUD useful
We can get around this by using AV Veil.At that time we used python module.In veil there are four types paiload.C, C #, Python, and PowerShell. They now use PowerShell module.
cd / pentest / exploits / set /
./set
Then give your IP & Port to connect a reverse shell.
Now in the figures you can see that it has been generated & stored in the / root / .set / reports / powershell. And we also start metasploit listener.If victim paste our payload generated in cmd then we can get meterpreter shell. But i think it's hard to tell someone to copy & paste
something into cmd. So we will create a batch file of our payload.
Create Batch File Of Our Payload
(1) open x86_powershell_injection.txt file from / root / .set / reports / powershell.
(2) Add path of powershell in first line. For example your code is starting from powershell word just put C: \ \ windows/system32/windowspowershell/v1.0 / before it.
(3) Copy all code from x86_powershell_injection.txt
(4) Create new file & paste code
(5) Save this file as. Extention bat and send to victim.

0 коментара:
Постави коментар