Antivirus Evading Payloads: An Introduction to Veil-Evasion
Step 7. Once the malicious .exe is run by the victim a reverse shell from the TOE is established with the attacking machine.The Meterpreter session then provides a beachhead for launching further exploits.The above example shows how easily an effective malicious payload can be generated using Veil-Evasion. I strongly recommend investigating the tool for yourself. There is an extensive range of payloads and functions available that this article only touches on. Once more it is worth noting Veil-Evasion’s biggest strength, is the ability to circumvent anti-virus software. Coupled with a good delivery mechanism Veil-Evasion is a worthy edition to any PenTester’s arsenal. I hope you found this article informative and thank you for reading. This is my first post so any constructive criticism or comments are welcome.This article is intended purely for academic purposes. Neither the author nor Cybrary endorses or takes responsibility for the malicious use of the Veil-Framework.