t3l3machus / Villain

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Other
3.77k stars 611 forks source link

Not able to establish backdoor #3

Closed pentest01 closed 1 year ago

pentest01 commented 1 year ago

No shell was generated, after following all the steps, don't know what i did wrong.

image

image

t3l3machus commented 1 year ago

Hi, i can see you are providing a public IP address to generate payload. Are you sure proper routing is in place? Have you port forwarded etc?

F4lafel commented 1 year ago

I tried it yesterday with KaliLinux--> Windos10Home + Windows11Home +Windows11Pro.

Everything worked fine and the AV have seen nothing.

I have a Question for you T3l3machus.

Is it possible to change the host-site? I would recommend to have host-site owned by me.

Does the host-site always change or does it use always the same? I didnt get that.

Thanks

t3l3machus commented 1 year ago

@F4lafel you can generate payload using a domain name but you have to start Villain providing cert.pem and key.pem files, that way you can do:

generate os=\ domain=\

Assuming that DNS resolution, port forwarding and everything is configured correctly

F4lafel commented 1 year ago

Where do i find cert.pem and key.pem files?

t3l3machus commented 1 year ago

@F4lafel if you follow the instructions here you will get them -> https://github.com/t3l3machus/toxssin#how-to-get-a-trusted-certificate

It's from another project but the idea is the same.