Open themedusacringe opened 2 years ago
Hey there.
Im sorry to hear that you had trouble with installing Veil,
Can you be so kind to give us some system info so that we can help you?
Its really hard to help without knowing more about your situation.
I would love to hear your reaction.
Eitherway happy hacking.
First of all i am beginner in hacking ,step by step i am learning .veil frame work was my first frame work to bypass antivirus of windows when installing the below problem π occurred
I install through GitHub link like git clone the veil link and it all went perfectly but at last it was saying me to give the directory for wine
And next i don't know what to do and again I went GitHub and started searching the problem which i have faced and some solution were there but I don't understand some of the solution so choose to install the wine manually through " sudo apt-get install wine and that also was not working properly and again I tried it again installing the veil frame work but this time I got "done" at the end i thought it was comple ted in installation but it says another problem i don't what to do please help me ,what ever the solution may be ,you can give, i will try but it should understand to me Because I am beginner !!! Ok some photo are attached i tried installing again and again for more than 5times
Thanks for your reaction.
I shall explain a little background of kali linux
Kali linux is a dedicated os for which no other purpose can be applied.
It uses a small and managed source.list and source.list.d ( the URL list used by apt)
To install tools. These tools are signed. 1 time by kali dev team and 1 time by the dev of the tool.
That said, its highly recommended to install all tools trough apt and only apt. And to not follow third party resources.
Here is a short list of reasons
Kali applies certain policy's for certain packages. Called kali policy.
You can think of it as a security profile specific for kali. Like mariadb ( a webserver). In a normal setup it would start its service and exposes a possible exploit entry point. The policy prevents that.
Its not to late to repair this so as a start point i would advice this:
One fast note. Kali.org has (potential) been pwned. It uses time based sandboxing evasion atm.
γ time based evasion looks at the system time to decide to drop a payload. VM OS installs like virtualbox have a very short in action time. Thus a give away that the os is sandboxed.
Keep that in mind when visting the kali tools website for the syntaxis of veil.
Let me know if this works better.
Happy hacking and a merry christmas.
I done everything what you have said but still I am fed up with the results what i have got, still it is not working ,same error so i am using my Kali Linux in VMware so i got uninstalled my Kali Linux and booted up the same version again with no other data's so i am fresh with my environment so from now what i have to do to install veil in my Linux ,help me with your suggestions please π₯Ίπ₯Ίπ₯Ί help me from the scratch
On Sat, Dec 25, 2021, 07:12 Karst de Graaf @.***> wrote:
Thanks for your reaction.
I shall explain a little background of kali linux
Kali linux is a dedicated os for which no other purpose can be applied.
It uses a small and managed source.list and source.list.d ( the URL list used by apt)
To install tools. These tools are signed. 1 time by kali dev team and 1 time by the dev of the tool.
That said, its highly recommended to install all tools trough apt and only apt. And to not follow third party resources.
Here is a short list of reasons
- its signed
- it prevents malware
- it won't (likely) brick/damage your kali install.
Kali applies certain policy's for certain packages. Called kali policy.
You can think of it as a security profile specific for kali. Like mariadb ( a webserver). In a normal setup it would start its service and exposes a possible exploit entry point. The policy prevents that.
Its not to late to repair this so as a start point i would advice this:
- [ β] backup existing data.
- [ β] do a fresh install trough a live medium to erase any corrupt files.
- [β ] depending if your live medium is a netinstall or a offline install do this: γ sudo apt update && sudo apt upgrade -y && sudo apt autoremove -y
- [ β] Run sudo apt install veil -y
- [β ] run veil with SUDO. This prevents damage cause the scope of the os is different. Check the kali tools page for syntax cause its different than what is on this github page.
One fast note. Kali.org has (potential) been pwned. It uses time based sandboxing evasion atm.
γ time based evasion looks at the system time to decide to drop a payload. VM OS installs like virtualbox have a very short in action time. Thus a give away that the os is sandboxed.
Keep that in mind when visting the kali tools website for the syntaxis of veil.
Let me know if this works better.
Happy hacking and a merry christmas.
β Reply to this email directly, view it on GitHub https://github.com/Veil-Framework/Veil/issues/454#issuecomment-1000956783, or unsubscribe https://github.com/notifications/unsubscribe-auth/AW7TRB2LKRBWPFJYLQLC6D3USUOP3ANCNFSM5KUTJMLA . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub.
You are receiving this because you authored the thread.Message ID: @.***>
Have you seen the info message related to wine?
Have you tried that? Sudo veil.py --setup and then to nuke the wine folder?
Its in your screenshot.
Yes, I did. But still it is not working
On Sat, Dec 25, 2021, 19:04 Karst de Graaf @.***> wrote:
Have you seen the info message related to wine?
Have you tried that? Sudo veil.py --setup and then to nuke the wine folder?
Its in your screenshot.
β Reply to this email directly, view it on GitHub https://github.com/Veil-Framework/Veil/issues/454#issuecomment-1001018693, or unsubscribe https://github.com/notifications/unsubscribe-auth/AW7TRBYDCG3KYSMRMUI2ZVTUSXB5RANCNFSM5KUTJMLA . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub.
You are receiving this because you authored the thread.Message ID: @.***>
Then i would submit a bug report in their bug tracker.
In the mean time i would advice you to install Zorin OS. Then to clone PTF and set it up.
Ptf is really straight forward and sets everything up for you and is easy to config and or extend trough modules.
If you look into the code of veil you can easily extend the package to ptf and run its custom module.
If thats to easy for you, you can always switch to parrot os security edition which takes care of alot of stuff for you, but is focussed at pentesting.
Succes β€
Is there any other way to install veil in Kali i am beginner right so i don't know the zorin is all and I know parrot is but not that much
On Sat, Dec 25, 2021, 19:57 Karst de Graaf @.***> wrote:
Then i would submit a bug report in their bug tracker.
In the mean time i would advice you to install Zorin OS. Then to clone PTF and set it up.
Ptf is really straight forward and sets everything up for you and is easy to config and or extend trough modules.
If you look into the code of veil you can easily extend the package to ptf and run its custom module.
If thats to easy for you, you can always switch to parrot os security edition which takes care of alot of stuff for you, but is focussed at pentesting.
Succes β€
β Reply to this email directly, view it on GitHub https://github.com/Veil-Framework/Veil/issues/454#issuecomment-1001024549, or unsubscribe https://github.com/notifications/unsubscribe-auth/AW7TRB3D33ZVXNBI6PZKSADUSXIDZANCNFSM5KUTJMLA . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub.
You are receiving this because you authored the thread.Message ID: @.***>
No, im afraid there is not.
Not at least for veil.
The only thing qua pentesting i can give you is hackthebox academy.
But its partly paid for real money.
The free Version should give you a easy and good starting point.
You can Just make a account and start hacking/study with dummy targets.
Its as easy as opening a openvpn file in a terminal and keeping it running as long as its needed.
That can come with security risks and is maybe a little hard to grasp for a beginner.
If thats a problem you could Just spin up a browser and start a pwnbox instance for max 2 hours a day for free. It has everything set up for you and is secure.
Its based on a lite Version of parrot os.
A other good starting point is w3schools javascript and python. It has a built in IDE and output. And explains everything in bite size bits. For free and no account needed.
Hope this helps. β€
Awesome, thank you so much!
On Sat, Dec 25, 2021, 20:53 Karst de Graaf @.***> wrote:
No, im afraid there is not.
Not at least for veil.
The only thing qua pentesting i can give you is hackthebox academy.
But its partly paid for real money.
The free Version should give you a easy and good starting point.
You can Just make a account and start hacking/study with dummy targets.
Its as easy as opening a openvpn file in a terminal and keeping it running as long as its needed.
That can come with security risks and is maybe a little hard to grasp for a beginner.
If thats a problem you could Just spin up a browser and start a pwnbox instance for max 2 hours a day for free. It has everything set up for you and is secure.
Its based on a lite Version of parrot os.
A other good starting point is w3schools javascript and python. It has a built in IDE and output. And explains everything in bite size bits. For free and no account needed.
Hope this helps. β€
β Reply to this email directly, view it on GitHub https://github.com/Veil-Framework/Veil/issues/454#issuecomment-1001035717, or unsubscribe https://github.com/notifications/unsubscribe-auth/AW7TRB2NV7JTWJFGVMYMYVLUSXOXDANCNFSM5KUTJMLA . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub.
You are receiving this because you authored the thread.Message ID: @.***>
You're more than welcome.β€
First of all i am beginner in hacking ,step by step i am learning .veil frame work was my first frame work to bypass antivirus of windows when installing the below problem π occurred
I install through GitHub link like git clone the veil link and it all went perfectly but at last it was saying me to give the directory for wine
And next i don't know what to do and again I went GitHub and started searching the problem which i have faced and some solution were there but I don't understand some of the solution so choose to install the wine manually through " sudo apt-get install wine and that also was not working properly and again I tried it again installing the veil frame work but this time I got "done" at the end i thought it was comple ted in installation but it says another problem i don't what to do please help me ,what ever the solution may be ,you can give, i will try but it should understand to me Because I am beginner !!! Ok some photo are attached i tried installing again and again for more than 5times
Bro jst do this..
there is a simple commad you have to type;;
pip install pycrypto
and done everything will be fine.
If worked ping me :)))))))
Veil version
OS Used - all info (architecture, linux flavor, etc)
How did you install Veil? (Apt, Clone from Github, etc.)
Did you run the setup script?
Pastebin link to error you are encountering (include console actions you took prior to error)
Expected behavior
Any additional info you want to tell me