govolution/avet

App crash

enkeyz opened this issue · 12 comments

So I used that bash script from Example 1, compiled it with mingw, and when I open exe on my VM, I get appcrash.
virtualbox_win7_x86_02_06_2017_14_37_09

Looks like not:D Will report back, if it works!

OK. I always had problems like that when using different compilers, don't know why. If any problems let me know.

So, now exe is running fine, but metasploit is stuck at here:
screenshot_20170602_151532

I'm not running any AVs, and firewall is off. It's a clean virtual machine.

OK, looks like a msf problem or config problem. Send the shellscript you used (with your settings included) and I have a look.

Also might be a network problem... VirtualBox sometimes sucks at this.

Network is fine. I tried with a simple msfvenom payload.

Script: https://pastebin.com/D4F3gbS3

Edit: rebooted my VMs, still same problem.

Your handler is tcp, but the payload is https, so:
set payload windows/meterpreter/reverse_https
on msfconsole.

LOL man! Did I really missed that? :D Thanks:)

Bye the way, thanks for your work, it's fully undetectable by AVs - 0/61 - really nice work!

No problem ;).

I tried Veil Framework and Shellter before, but they get caught immediately. I'm not really into these things, but why are your project works, and others not?

Hard to say without a closer look. Might be my tool is newer and is not recognized because of that. Or maybe the evasion techniques that are used are effective. If you want to know more check out:
https://deepsec.net/docs/Slides/2014/Why_Antivirus_Fails_-_Daniel_Sauder.pdf
https://govolutionde.files.wordpress.com/2014/05/avevasion_pentestmag.pdf