-
Notifications
You must be signed in to change notification settings - Fork 336
error while compiling #84
Description
[+] MODULE DESCRIPTION:
Pure C reverse tcpstager
compatible with metasploit and cobaltstrike beacon
[>] Local process stage execution type:
Thread
APC
[>] Local Memory allocation type:
Virtual_RWX
Virtual_RW/RX
Virtual_RW/RWX
Heap_RWX
[>] AUTOCOMPILE format: exe,dll
Press Enter to continue:
[>] Insert Target architecture (default:x86):
[>] Insert LHOST: 192.168.1.107
[>] Insert LPORT: 443
[>] Insert Exec-method (default:Thread):
[>] Insert Memory allocation type (default:Virtual_RWX):
[>] Insert Junkcode Intesity value (default:10):
[>] Insert Junkcode Frequency value (default: 10):
[>] Insert Junkcode Reinjection Frequency (default: 0):
[>] Insert Evasioncode Frequency value (default: 10):
[>] Dynamically load windows API? (Y/n):y
[>] Add Ntdll api Unhooker? (Y/n):y
[>] Masq peb process? (Y/n):y
[>] Insert fake process path?(default:C:\windows\system32\notepad.exe):
[>] Insert fake process commandline?(default:empty):
[>] Strip executable? (Y/n):y
[>] Use certificate spoofer and sign executable? (Y/n):y
[>] Insert url target for certificate spoofer (default:www.windows.com:443):
[>] Insert certificate description (default:Notepad Benchmark Util):
[>] Insert output format (default:exe):
[>] Insert output filename:filename.exe
[>] Generating code...
[>] Compiling...
[>] Strip binary...
[>] Sign Executable
Traceback (most recent call last):
File "phantom-evasion.py", line 402, in
CompleteMenu()
File "phantom-evasion.py", line 125, in CompleteMenu
Phantom_lib.ModuleLauncher(module_type)
File "Setup/Phantom_lib.py", line 964, in ModuleLauncher
ExeSigner(ModOpt["Outfile"],ModOpt["SpoofCert"],ModOpt["descr"])
File "Setup/Phantom_lib.py", line 439, in ExeSigner
pfx = crypto.PKCS12Type()
AttributeError: module 'OpenSSL.crypto' has no attribute 'PKCS12Type'
root@kali:~/tools/Phantom-Evasion#