当前位置:网站首页>Cobaltstrike builds an intranet tunnel
Cobaltstrike builds an intranet tunnel
2022-07-05 22:03:00 【Global variable Global】
Through detailed explanation CobaltStrike Tools , A deeper grasp of CobaltStrike usage ; The content of the text is compiled by personal understanding , If there is any mistake , Bosses do not spray , Personal skills are not good ; Any technique mentioned in this article comes from range practice , For reference only , Do not use the related technology in the article to engage in illegal testing , If all the adverse consequences caused by this have nothing to do with the author of the article .
CobaltStrike Build an intranet tunnel
Establish intranet tunnel network card
When we need to access the internal network on the attacker , Not established in sockes5 Under the circumstances , You can also build intranet tunnels :
covertvpn phear6 10.10.10.145 # Establish intranet tunnel network card
When it's done , Can be in Cobalt Strike Check the network card in the menu , After use, there will be traffic at this location :
Create a virtual network card
Then we need to establish a virtual network card in the attacker :
ifconfig phear6 10.10.10.0/24 # establish phear6 network card
Access internal network
In this way, we can directly access the internal network through the attacker 10.10.10.138 Or our domain controller IP10.10.10.142:
It can also be used nmap To scan their 445 port , This ratio socks More convenient and faster .
And it can be seen from the figure that the flow is from CS go :
边栏推荐
- 从零开始实现lmax-Disruptor队列(四)多线程生产者MultiProducerSequencer原理解析
- Oracle views the data size of a table
- Cross end solutions to improve development efficiency
- Ad637 notes d'utilisation
- Oracle advanced query
- HYSBZ 2243 染色 (树链拆分)
- QML reported an error expected token ";", expected a qualified name ID
- Pointer parameter passing vs reference parameter passing vs value parameter passing
- Summary of concurrency control
- The American Championship is about to start. Are you ready?
猜你喜欢
装饰器学习01
[Yugong series] go teaching course in July 2022 004 go code Notes
K210 learning notes (IV) k210 runs multiple models at the same time
Defect detection - Halcon surface scratch detection
Storage optimization of performance tuning methodology
ICMP 介绍
How to use tensorflow2 for cat and dog classification and recognition
数博会精彩回顾 | 彰显科研实力,中创算力荣获数字化影响力企业奖
从零开始实现lmax-Disruptor队列(四)多线程生产者MultiProducerSequencer原理解析
Analysis and test of ModbusRTU communication protocol
随机推荐
Detailed explanation of memset() function usage
1.3 years of work experience, double non naked resignation agency face-to-face experience [already employed]
数据泄露怎么办?'华生·K'7招消灭安全威胁
datagrid直接编辑保存“设计缺陷”
Summary of El and JSTL precautions
Getting started with microservices (resttemplate, Eureka, Nacos, feign, gateway)
Huawei game multimedia service calls the method of shielding the voice of the specified player, and the error code 3010 is returned
Cross end solutions to improve development efficiency
【愚公系列】2022年7月 Go教学课程 003-IDE的安装和基本使用
The real situation of programmers
Analyse des risques liés aux liaisons de microservices
资深电感厂家告诉你电感什么情况会有噪音电感噪音是比较常见的一种电感故障情况,如果使用的电感出现了噪音大家也不用着急,只需要准确查找分析出什么何原因,其实还是有具体的方法来解决的。作为一家拥有18年品牌
从零开始实现lmax-Disruptor队列(四)多线程生产者MultiProducerSequencer原理解析
Countdown to 92 days, the strategy for the provincial preparation of the Blue Bridge Cup is coming~
HDU 4391 Paint The Wall 段树(水
Stored procedures and stored functions
Concurrency control of performance tuning methodology
Multiplexing of Oracle control files
微服務鏈路風險分析
Net small and medium-sized enterprise project development framework series (one)