Indonesian Back|Track Team
Share Payload executable with avast 8.0.1489. - Printable Version

+- Indonesian Back|Track Team (https://www.indonesianbacktrack.or.id/forum)
+-- Forum: Attacker Zone (https://www.indonesianbacktrack.or.id/forum/forum-169.html)
+--- Forum: Exploitation (https://www.indonesianbacktrack.or.id/forum/forum-43.html)
+---- Forum: Lain-lain (https://www.indonesianbacktrack.or.id/forum/forum-125.html)
+---- Thread: Share Payload executable with avast 8.0.1489. (/thread-4809.html)



Payload executable with avast 8.0.1489. - iwan21 - 07-17-2013

permisi om dan kawan2 kawan kawan
gue mau nanya gimana cara membuat payload yang tidak terdeteksi avast antivirus dan juga antivirus yang lainnya?

gue udah coba pake msfvenom tapi blom bner mungkin cara saya menggunakannya

mohon pencerahan dari agan-brosesepuh dan semua kawan kawan IBTeam....


RE: [ASK] payload executable with avast 8.0.1489. - overtampan - 07-19-2013

payload ane juga sering didetect sama avast Sad


RE: [ASK] payload executable with avast 8.0.1489. - iwan21 - 07-20-2013

(07-19-2013, 08:37 AM)overtampan Wrote: payload ane juga sering didetect sama avast Sad

trus gimana solusinya?


RE: [ASK] payload executable with avast 8.0.1489. - zuhritkj96 - 12-19-2013

kalo ane semua antivirus ke deteck, para brother kemana???
napa gk masok....


RE: [ASK] payload executable with avast 8.0.1489. - smokerchuy - 06-25-2014

coba pake veil om. . . ane coba buat bisa bypass antivirus yg biasa dipake. tapi ane ada masalah untuk melakukan metasploit dengan jaringan luar / ga satu lan. . . mungkin ada ygn bisa bantu?? :d


RE: Payload executable with avast 8.0.1489. - iKONspirasi - 06-30-2014

(06-25-2014, 06:08 PM)smokerchuy Wrote: coba pake veil om. . . ane coba buat bisa bypass antivirus yg biasa dipake. tapi ane ada masalah untuk melakukan metasploit dengan jaringan luar / ga satu lan. . . mungkin ada ygn bisa bantu?? :d

iya coba pake veil framework, bisa dilihat disini:
https://github.com/Veil-Framework/Veil-Evasion

dengan jaringan luar cukup listen 0.0.0.0/0 saja dan reverse_tcp arahkan ke ip publik kita.


RE: Payload executable with avast 8.0.1489. - smokerchuy - 07-04-2014

(06-30-2014, 04:45 AM)iKONspirasi Wrote:
(06-25-2014, 06:08 PM)smokerchuy Wrote: coba pake veil om. . . ane coba buat bisa bypass antivirus yg biasa dipake. tapi ane ada masalah untuk melakukan metasploit dengan jaringan luar / ga satu lan. . . mungkin ada ygn bisa bantu?? :d

iya coba pake veil framework, bisa dilihat disini:
https://github.com/Veil-Framework/Veil-Evasion

dengan jaringan luar cukup listen 0.0.0.0/0 saja dan reverse_tcp arahkan ke ip publik kita.

ane ada maslah lagi ni om pas ane mau bikin payload pake python/meterpreter/rev_tcp ada eror :

Spoiler! :

Traceback (most recent call last):
File "C:\Python27\lib\site.py", line 548, in <module>
main()
File "C:\Python27\lib\site.py", line 530, in main
known_paths = addusersitepackages(known_paths)
File "C:\Python27\lib\site.py", line 266, in addusersitepackages
user_site = getusersitepackages()
File "C:\Python27\lib\site.py", line 241, in getusersitepackages
user_base = getuserbase() # this will also set USER_BASE
File "C:\Python27\lib\site.py", line 231, in getuserbase
USER_BASE = get_config_var('userbase')
File "C:\Python27\lib\sysconfig.py", line 516, in get_config_var
return get_config_vars().get(name)
File "C:\Python27\lib\sysconfig.py", line 449, in get_config_vars
import re
File "C:\Python27\lib\re.py", line 105, in <module>
import sre_compile
File "C:\Python27\lib\sre_compile.py", line 14, in <module>
import sre_parse
File "C:\Python27\lib\sre_parse.py", line 17, in <module>
from sre_constants import *
File "C:\Python27\lib\sre_constants.py", line 18, in <module>
from _sre import MAXREPEAT
ImportError: cannot import name MAXREPEAT
mv: cannot stat `dist/payload.exe': No such file or directory
rm: cannot remove `*.spec': No such file or directory
rm: cannot remove `logdict*.*': No such file or directory


dia minta run update.py setelah dijalankan ttp aja ga bisa ane ubah di setting.py jg ga jadi. . apa python ane yang eror yah??


RE: Payload executable with avast 8.0.1489. - iKONspirasi - 07-04-2014

(07-04-2014, 02:02 AM)smokerchuy Wrote:
(06-30-2014, 04:45 AM)iKONspirasi Wrote:
(06-25-2014, 06:08 PM)smokerchuy Wrote: coba pake veil om. . . ane coba buat bisa bypass antivirus yg biasa dipake. tapi ane ada masalah untuk melakukan metasploit dengan jaringan luar / ga satu lan. . . mungkin ada ygn bisa bantu?? :d

iya coba pake veil framework, bisa dilihat disini:
https://github.com/Veil-Framework/Veil-Evasion

dengan jaringan luar cukup listen 0.0.0.0/0 saja dan reverse_tcp arahkan ke ip publik kita.

ane ada maslah lagi ni om pas ane mau bikin payload pake python/meterpreter/rev_tcp ada eror :

Spoiler! :

Traceback (most recent call last):
File "C:\Python27\lib\site.py", line 548, in <module>
main()
File "C:\Python27\lib\site.py", line 530, in main
known_paths = addusersitepackages(known_paths)
File "C:\Python27\lib\site.py", line 266, in addusersitepackages
user_site = getusersitepackages()
File "C:\Python27\lib\site.py", line 241, in getusersitepackages
user_base = getuserbase() # this will also set USER_BASE
File "C:\Python27\lib\site.py", line 231, in getuserbase
USER_BASE = get_config_var('userbase')
File "C:\Python27\lib\sysconfig.py", line 516, in get_config_var
return get_config_vars().get(name)
File "C:\Python27\lib\sysconfig.py", line 449, in get_config_vars
import re
File "C:\Python27\lib\re.py", line 105, in <module>
import sre_compile
File "C:\Python27\lib\sre_compile.py", line 14, in <module>
import sre_parse
File "C:\Python27\lib\sre_parse.py", line 17, in <module>
from sre_constants import *
File "C:\Python27\lib\sre_constants.py", line 18, in <module>
from _sre import MAXREPEAT
ImportError: cannot import name MAXREPEAT
mv: cannot stat `dist/payload.exe': No such file or directory
rm: cannot remove `*.spec': No such file or directory
rm: cannot remove `logdict*.*': No such file or directory


dia minta run update.py setelah dijalankan ttp aja ga bisa ane ubah di setting.py jg ga jadi. . apa python ane yang eror yah??

liat errornya sih sepertinya python librarynya ga ditemukan, metasploit pake python versi brp ya skrg?


RE: Payload executable with avast 8.0.1489. - smokerchuy - 07-04-2014

[
Quote:liat errornya sih sepertinya python librarynya ga ditemukan, metasploit pake python versi brp ya skrg?

ane pake python 2.7 om. ..