This project demonstrates the creation of payloads using msfvenom. Below are step-by-step explanations of how different payloads were created and executed.
The first payload was created using the msfvenom tool, targeting a Windows platform. This payload generates a message box that displays "Virus Executed". The payload was saved as an executable (.exe) file.
Command used:
msfvenom -a x86 --platform windows -p windows/messagebox TEXT="Virus Executed" -f exe -o messageVirus.exe
This demonstrates how simple it is to create a virus that displays a harmless message, showing the power of msfvenom for payload generation.
Now, let's take it a step further and create a virus that combines multiple payloads into one executable. In this case, we generate two payloads: one that shows a message box and another that uses the windows/speak_pwned payload, which causes the system to audibly say "You have been pwned".
For the first payload, we use a message box with the raw format. Then, we add the second payload to bundle them together.
Commands used:
msfvenom -c messageBox -a x86 --platform windows -p windows/speak_pwned -f exe -o pwnedVirus.exe
This demonstrates how to combine multiple payloads into a single virus, increasing the complexity and functionality of the attack.
In this step, we created an encrypted payload using the windows/speak_pwned command and saved it with encryption using Python. This adds an additional layer of security to the payload, making it harder for detection systems to identify the virus.
Command used:
msfvenom -c messageEncrypted -a x86 --platform windows -p windows/speak_pwned -f exe -o pyVirus.exe
Encryption adds an extra layer of obfuscation to the payload, making it more difficult for security tools to detect or analyze.
Below is a GIF that shows the step-by-step process of creating and running these payloads. The GIF demonstrates how msfvenom was used to generate, combine, and execute different payloads.