Pack Shellcode
Last updated
Last updated
When your packed application gets executed, the following will happen:
The unpacker gets executed first, as it is the executable's entry point.
The unpacker reads the packed application's code.
The unpacker will write the original unpacked code somewhere in memory and direct the execution flow of the application to it.
This payload takes a shellcode generated by msfvenom and runs it into a separate thread.
ConfuserEx will require you to indicate the folders in which it will work. Be sure to select your desktop as the base directory, as shown in the image below. Once the base directory is set up, drag and drop the executable you want to pack on the interface, and you should end up with the following:
Let's go to the settings tab and select our payload. Once selected, hit the "+" button to add settings to your payload. This should create a rule named "true". Make sure to enable compression as well:
We will now edit the "true" rule and set it to the Maximum preset:
Finally, we will go to the "Protect!" tab and hit "Protect":
We will use the packer for this task, as our payloads are programmed on .NET.