Generating a Veil backdoor

We're now going to use Veil to generate a backdoor. First, we'll run the list command. We'll type the use 1 command, as we want to use Evasion and press Enter, and, as we want to use the fifteenth payload, we'll run the use 15 command, as follows:

Using the following options, we're going to change the payload's IP LHOST to the IP address of the Kali machine we're using.

To get the IP address of our Kali machine, we have to run ifconfig. Split the screen by right-clicking and selecting Split Horizontally, and then run the command. As shown in the following screenshot, the Kali machine's IP address is 10.0.2.15,

Get Learn Ethical Hacking from Scratch now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.