Implementing an Undetectable Backdoor by Applying Veil Framework

Implementing an Undetectable Backdoor by Applying Veil Framework

Authors

  • Jobin T J ktu
  • Alan S Mathew

Keywords:

— Veil, Anti-Virus, Malware, Payloads Undetectable Backdoor, Firewall, Penetration Testing, Remote Desktop Backdoor

Abstract

The Veil-Evasion is a Kali Linux Framework
with a selection of tools invented for use during offensive
security testing. It permits us to create undetectable backdoors
that could control all system instructions without any consumer
cognizance. Most of the backdoors are detected by an antivirus
program by comparing the file with a massive database of
harmful signatures. If the document suits any signature on the
database, that record could be considered as a dangerous report.
These will be the default settings on each antivirus. Veil evasion
combines with the Meterpreter session to execute system
commands on the victim’s machine, and also this tool will
provide us with the source code of the actual payload in different
languages such as power-shell, go, python, c, etc. As a result, the
possibility of creating a unique signature is unlimited. Then this
newly created payload can be injected into a pdf file like this to
make the target system vulnerable.

Published

2022-12-20

How to Cite

Jobin T J, & Alan S Mathew. (2022). Implementing an Undetectable Backdoor by Applying Veil Framework. National Conference on Emerging Computer Applications, 3(1). Retrieved from https://ajcejournal.in/nceca/article/view/109
Loading...