To test that our backdoor is working as expected, we're going to put it on our web server and download it from the target computer. We don't recommend this approach for anything other than testing your backdoor.
As Kali can be used as a website, we're going to put our backdoor online and download it from the target Windows machine. We're going to keep this download in one place, a folder called evil-files, as shown in the following screenshot:
Now, the backdoor we created using Veil-Evasion, which was stored in var/lib/veil-evasion/output/compiled/, needs to be copied and pasted into the evil-files directory. And that's it! We can download the file from Kali.
To start the web server and website, input the following command in the terminal:
service apache2 start
Here, the command is service, and apache2 is the name of the web server...