Veil-Evasion
The first tool we will use is called Veil-Evasion
. What is Veil-Evasion
and how does it work? Most devices that have some kind of antivirus software will be able to detect basic Meterpreter binaries. These binaries are found within the payload. If you remember our lab in Chapter 4, Creating a RAT Using Msfvenom, we created a RAT using msfvenom and Meterpreter. When we created that RAT we used a popular Metasploit encoder named Shikata_ga_nai
. This encoder was used to bypass antivirus protection in the Windows OS. Due to Shikata's popularity, most AVs solutions have recorded Shikata's signature in their databases. This results in Shikata being detected and stopped immediately by most AVs. A hacker may use Veil-Evasion
to get around this.
Veil-Evasion
uses a number of different encoding methods to change file signatures to avoid detection. When Veil-Evasion
manipulates the file signature, AV programs can no longer cross-reference it with their database of known exploits/vulnerabilities...