Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Obfuscation and encoding


Since we know that our files are getting detected, we have methods to try to make them harder to detect, and as you can imagine with signature-based detection, the goal is to modify the file so that it does not match the signature. As we have done before, we will look at the modules that metasploit provides to try to modify the files' signature. The tool we will look at is the msfencode in metasploit. We can review the usage of the tool by entering msfencode –h. The output of this command is shown in the following screenshot:

The next thing we want to explore is the actual encoders themselves. The tool not only has a number of options, but also has quite a few different encoders as the list in the following screenshot shows:

The last technique we will use to see the detection capability against it is the concept of a backdoor in an executable file. What we like about this is that we can backdoor any legitimate executable file, and when the user runs it, they will send...