-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Mastering Metasploit
By :

In the previous chapter, we saw how we could defeat AVs with custom encoders. Let's go one step further and talk about encryption and obfuscation in Metasploit payloads; we can use a great tool called Venom for this.
Important note
Refer to the Venom setup guide, available at https://github.com/r00t-3xp10it/venom.
Let's create some encrypted Meterpreter shellcode, as shown in the following screenshot:
Figure 10.22 – Launching Venom from a Kali Terminal
As soon as you start Venom in Kali Linux, you will be presented with the screen shown in the preceding screenshot. The Venom framework is a creative work from Pedro Nobrega and Chaitanya Haritash (Suspicious-Shell-Activity), who worked extensively to simplify shellcode and backdoor generation for various OSes. Let's hit Enter to continue:
Figure 10.23 – Choosing Windows OS payloads
As we can see, we have options to create...