• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Social Engineering

      Bypassing Anti-Virtus & Hacking Windows 10 Using Empire

      • Posted by Zaid Sabih
      • Date February 23, 2018

      Most of us have heard of msfvenom or or at least metasploit backdoors, they’re great but they get detected by anti-virus programs, we also know we can use a tool called Veil-Evasion to generate backdoors that bypass most anti-virus programs, the effectiveness of such tools depends on how recently they were updated, therefore sometimes Veil will generate backdoors that will get detected by several AV programs, the way to fix this is to modify the backdoor manually to make it more unique (this is a completely different topic, I actually cover that in my social engineering course), alternatively you can just try to generate the backdoor using another tool, such as Empire.

      Empire does not come pre-installed in Kali, follow these simple steps to install it:

      1. Go to the /opt directory (optional).
      cd /opt
      

       

      2. Clone the project from github.

      git clone https://github.com/EmpireProject/Empire.git

       

      3. Navigate to its setup directory

      cd Empire/setup

       

      4. Run the installer

      ./install.sh

       

      Wait for the installer to finish, and then you can run the tool from its directory in /opt/Empire, so first you’ll have to navigate to it using cd

      cd /opt/Empire

       

      Then run it

      ./empire

      And that should start the tool for you, so you should see something like this

       

      Now you’re ready to use the tool, checkout the following video to learn how to use the tool in general, as an example you will learn how to generate a windows backdoor that bypass anti-virus programs and use this backdoor to hack Windows 10.

      • Share:
      author avatar
      Zaid Sabih

      Ethical Hacker, Pentester & Computer Scientist

      Zaid Al-Quraishi is an ethical hacker, computer scientist, and founder of zSecurity. He studied Computer Science at University College Dublin, graduating May 2016.

      Zaid has a strong background and experience in ethical hacking, starting with video tutorials in 2009 in an ethical hacking community, iSecur1ty.org. He also worked as a penetration tester (pentester) for this company.

      In 2013 he started teaching his first course online in Arabic which received extremely positive feedback. This motivated him to create an English version of the course. The English course became the most popular and top paid course on Udemy for almost a year, which further motivated Zaid to design and teach more courses on ethical hacking.

      He now offers a number of courses on ethical hacking and more than 800,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

      Zaid says: "I just love hacking and breaking the rules but don't get me wrong, I am an ethical hacker!"

      Previous post

      Ninja Spy Framework
      February 23, 2018

      Next post

      Hacking Mac OS X Using A Microsoft Office Document
      March 21, 2018

      You may also like

      storm-braker_370x208
      Access Location, Camera & Mic of any Device 🌎🎤📍📷
      23 March, 2023
      maxresdefault5_370x208
      Hack Using a Link
      15 December, 2022
      maxresdefault2_370x208 (1)
      Hack With SMS | SMS Spoofing like Mr. Robot!
      20 November, 2022

        16 Comments

      1. Theaftadak
        March 23, 2018
        Log in to Reply

        Hello Zaid when I run ./empire I get importerror missing modules named iptools could you help

        • Adrielle De Guia
          March 28, 2018
          Log in to Reply

          Maybe you should install the required modules first before running empire , you can find them in the setup directory.

          • Theaftadak
            April 8, 2018
            Log in to Reply

            Thanks for the reply but am novice here how do I manoeuvre to the set up directory kindly guide

      2. aliensoldier
        August 21, 2018
        Log in to Reply

        Got a quistion about Empire Powershell may be you should know the answer.

        I was testing Powershell Empire after 9 months and generate a launcher bat.
        But I see my test bat file is getting detected on a lot of AV’S.

        About 9 months a go, if I generate a launcher bat it was FUD. 1/36 or 2/36 max.
        But now i see its detecteble on most of the AV’s

        My quistion: Is Empire getting outdated?
        Or do they update not so often that much any more because people still using scanners that distrubute instead of private av scanners.

        Thanks……

      3. svastik
        October 10, 2018
        Log in to Reply

        The ip I set 10.0.2.15 does not open when I try it on the windows machine. What should I do ?

        • dothekhabib
          March 9, 2019
          Log in to Reply

          did you ever figure this out? I tried doing the same thing putting the ip address in the address bar/evil-files but it says unable to connect…

        • saurav1199
          December 7, 2019
          Log in to Reply

          Even I have been getting the same result. I would love to hear back as soon as possible.

      4. insutama
        January 22, 2019
        Log in to Reply

        I tried running and im getting this error
        Traceback (most recent call last):
        File “./empire”, line 13, in
        from lib.common import empire, helpers
        File “/opt/Empire/lib/common/__init__.py”, line 8, in
        import helpers
        File “/opt/Empire/lib/common/helpers.py”, line 50, in
        import iptools
        ImportError: No module named iptools

        and i did the install.sh

      5. narmert123
        March 2, 2019
        Log in to Reply

        this Trojan which created above maybe no distribute website ain’t catch up basically, but definitely Win Defender catches the trojen, How can you guys anonymous tho ?
        Thank you

      6. techy krish
        August 30, 2019
        Log in to Reply

        it was caught by windows defender

      7. shayam
        February 12, 2020
        Log in to Reply

        Zaid i am having problem in outfile. I didnt understand what to do ?how to create directory please help

      8. patidar09
        April 15, 2020
        Log in to Reply

        File “empire”, line 13, in
        from lib.common import empire, helpers
        File “/opt/Empire/lib/common/empire.py”, line 34, in
        import agents
        File “/opt/Empire/lib/common/agents.py”, line 68, in
        import encryption
        File “/opt/Empire/lib/common/encryption.py”, line 27, in
        import M2Crypto
        ImportError: No module named M2Crypto

        How to fix this error

      9. rishi321
        July 30, 2020
        Log in to Reply

        Traceback (most recent call last):

        File “./empire”, line 13, in
        from lib.common import empire, helpers
        File “/opt/Empire/lib/common/empire.py”, line 34, in
        import agents
        File “/opt/Empire/lib/common/agents.py”, line 68, in
        import encryption
        File “/opt/Empire/lib/common/encryption.py”, line 27, in
        import M2Crypto
        ImportError: No module named M2Crypto

        how to fix it???????

      10. manurunj
        August 14, 2020
        Log in to Reply

        Hi Zaid, thank you for putting this resource on your udemy teaching.

        I installed Empire on my kali on cd directory, but I could not run it successfully as it give me this message.
        [email protected]:~/opt/Empire# ./empire
        Traceback (most recent call last):
        File “./empire”, line 5, in
        from flask import Flask, request, jsonify, make_response, abort, url_for
        ImportError: No module named flask

        Thank you for your help.

      11. Muhannad Alahmadi
        November 15, 2020
        Log in to Reply

        شكراً

      12. gtgkartik
        December 24, 2020
        Log in to Reply

        hello zaid i when i run ./empire its showing an error like this..
        Traceback (most recent call last):
        File “./empire”, line 5, in
        from flask import Flask, request, jsonify, make_response, abort, url_for
        ImportError: No module named Flask

        how to resolve this??

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance