Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Defense Evasion with Veil

In this course, Red Teamers will learn how to utilize the Veil to easily create unique payloads which will execute your preferred payload. T1027 on the specified target system T1480.001.

Intermediate
18m
(9)

Created by Jurriën

Last Updated Jan 08, 2021

Course Thumbnail
  • Course

Defense Evasion with Veil

In this course, Red Teamers will learn how to utilize the Veil to easily create unique payloads which will execute your preferred payload. T1027 on the specified target system T1480.001.

Intermediate
18m
(9)

Created by Jurriën

Last Updated Jan 08, 2021

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Threat actors, penetration testers, and Red Teamers often need to get a payload through target defenses to verify a vulnerability or gain a form of access to the target system in order to further their progress towards the agreed upon goal. In this course, Defense Evasion with Veil, you’ll cover how to utilize the Veil to execute obfuscated payloads in a Red Team environment. First, you'll learn how to install the framework within Kali Linux and create a payload through the UI. Next, you’ll apply the knowledge learned about building the payload through the UI and create a similar payload through the command line for automation purposes. Finally, you’ll simulate how to check if any of the generated payloads is known within the VirusTotal database. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1027 using Veil. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Defense Evasion with Veil
Intermediate
18m
(9)
Table of contents

About the author
Jurriën - Pluralsight course - Defense Evasion with Veil
Jurriën
3 courses 0.0 author rating 0 ratings

IT Security Specialist focussing on setting up Red Teams and their infrastructure.

Get started with Pluralsight