Solved

Metasploit payload reverse_tcp

Posted on 2015-01-19
2
154 Views
Last Modified: 2015-01-22
Experts,

I am doing pentesting as a proof of concept.

In regards to a reverse_tcp payload from Metasploit, is there a way to make it not be an .exe file? I can't upload .exe at my particular website.  Is there a tool that I can run my payload through so that it can be hidden/disguised and not picked up by my antivirus?
0
Comment
Question by:trojan81
2 Comments
 
LVL 79

Expert Comment

by:David Johnson, CD, MVP
ID: 40559369
you could use winrar/winzip and encrypt the .exe into the zipx/rar archive
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 40559409
password protect the exe is one mean but be wary it can be dropped by security devices as well esp such as email exchanges etc. I was thinking to remove it fingerprint such as MZ in header etc but that will not enable it to run off w/o changing back, and now AV and equivalent is capable to detect that too...

Assuming the objective is to make the exe undetectable by AV, you can check out PEScrambler is a tool to obfuscate win32 binaries automatically. The idea is to encode the file such that antivirus/anti malware cannot detect it (easily). Another in Metasploit, you can check out "shikata_ga_nai" but that is also encoding but fall in the same limitation though chances of detection are slightly lower.

...Another "common" mean is separating the exe and payload e.g. modify the signature of your intended metasploit payload or to write your own shellcode and to play with different packers and encoders until you have an executable which will be undetectable. See this blog sharing

also i see this of interest as well using the "-k" option with the "shikata_ga_nai" e.g. shikata_ga_nai -c 5 -t exe -k -x /root/Some_Dir/legitimate.exe >  /root/Desktop/legitimate-payload_2.exe . Simply, that option is to have the payload launched as a separate thread allowing the legitimate executable to launch normally in an attempt to avert user suspicion.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to get maximum transfer speed over LAN 4 81
mysql disables rename 4 68
awk variable in printf 1 24
Home wireless security 10 47
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Ensuring effective and secure communication in the age of healthcare BYOD.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question