Testing the backdoor
To test that our backdoor is working as expected, we're going to put it on our web server and download it from the target computer. We don't recommend this approach for anything other than testing your backdoor.
As Kali can be used as a website, we're going to put our backdoor online and download it from the target Windows machine. We're going to keep this download in one place, a folder called evil-files
, as shown in the following screenshot:

Now, the backdoor we created using Veil-Evasion, which was stored in var/lib/veil-evasion/output/compiled/
, needs to be copied and pasted into the evil-files
directory. And that's it! We can download the file from Kali.
To start the web server and website, input the following command in the terminal:
service apache2 start
Here, the command is service
, and apache2
is the name of the web server. Hitting Enter will execute the previous command.
We now need to navigate to our Kali machine's IP address, 10.0.2.15
. This should open the basic...