1 00:00:01,460 --> 00:00:03,290 ‫Creating custom payloads. 2 00:00:06,400 --> 00:00:12,190 ‫The payloads of well-known frameworks such as Metasploit, easily recognized by the security systems, 3 00:00:12,910 --> 00:00:15,910 ‫the best way to avoid this is to create your own payload. 4 00:00:16,390 --> 00:00:24,820 ‫There are open source and free tools to create your own malware and payloads such as veil avoid with 5 00:00:24,820 --> 00:00:26,230 ‫a zero instead of an no. 6 00:00:27,210 --> 00:00:27,900 ‫Syringe. 7 00:00:29,320 --> 00:00:30,010 ‫Fat rat. 8 00:00:31,160 --> 00:00:32,180 ‫And Empire. 9 00:00:34,010 --> 00:00:37,550 ‫Now you will see how to create a custom payload using veil framework. 10 00:00:38,150 --> 00:00:41,030 ‫First, let's install it to our Kali machine. 11 00:00:41,720 --> 00:00:44,450 ‫If we Google as veil of Asian. 12 00:00:48,950 --> 00:00:52,400 ‫The first thing will be the GitHub page of Vale evasion. 13 00:00:53,090 --> 00:00:57,380 ‫This page redirects us to the GitHub page of Vale 3.0. 14 00:00:58,730 --> 00:01:00,320 ‫In the read me part of the page. 15 00:01:04,270 --> 00:01:06,690 ‫We see the quick installation guide. 16 00:01:08,300 --> 00:01:13,730 ‫We simply follow the steps of this installation guide installed, yet if it's not already installed. 17 00:01:16,950 --> 00:01:19,920 ‫Create the clone of the Veil 3.0 project. 18 00:01:30,120 --> 00:01:31,740 ‫Go to Vail folder. 19 00:01:36,240 --> 00:01:42,150 ‫Under the set up folder, run set up Dot S.H. script with the Dash C parameter. 20 00:01:46,080 --> 00:01:47,520 ‫And this will take a few minutes. 21 00:02:08,370 --> 00:02:11,550 ‫In this period, some install wizards are opened. 22 00:02:11,820 --> 00:02:12,600 ‫Don't worry. 23 00:02:12,960 --> 00:02:15,390 ‫They're all next Knicks finish Wizards.