This article is intended to demonstrate, how to bypass the anti-virus detection using the Veil framework, as it is a collection of tools designed for use during penetration testing. It currently consists of the following modules −
To install the Veil- Framework, you are supposed to configure the latest Python packages into your machine.
The important point to remember is that the installation must be done with superuser privileges. If you are not using the root account (as default with Kali Linux), prepend commands with sudo or change to the root user before beginning. The Veil-Framework is a fantastic tool for avoiding payload detection by the anti-virus software. To install it, you first need to download it from Github and perform the following commands.
git clone https://github.com/Veil-Framework/Veil.git cd Veil/ ./config/setup.sh --force --silent
Now, select the operation Evasion from the list as following to generate the payload;
To list all the available payloads, select the list option as usual which will display all the available payloads as following −
Now, select your payload using the use command as following; −
Finally, after selecting the payload, select the py2exe option and hit the generate command to generate the desired FUD payload as following;
Here, in the aforesaid image, you can easily see that the runme.bat fully undetectable virus (payload) is generated and stored in the /usr/share.veil-output/source directory.