Cobalt Strike simple to use

--- --- restore content begins

I. Introduction:

  After penetration testing tool based on Java development for inter-teams work together, referred to as "CS".

  CS is divided into client and server, under normal circumstances we call server to server team, the tool has a social function (social engineering), the server team can help us gather information and records management diary, in Linux require root privileges open team server, Windows server team to open the administrator.

Second, step

  Step1: open team server (which is generally serverIP current machine IP)

Linux:teamserver serverIP password
Windows:teamserver.exe serverIP password

  

  Step2: open client

Linux: ./ CobaltStrike or the Java - jav CobaltStrike.jar 
Windows: Double-click CobaltStrike.exe or CobaltStrike.jar

  

  

   Step3: Set up listeners in "Cobalt Strike" ----> "listeners" ----> click "Add"

  

   

  beacon built-in listener, perform payload on the target host to obtain shell of CS in its type has dns / http / https / smb type;

  binding foreign external listener, and MSF general linkage obtain meterpreter (shell) in the MSF, the shell can be understood as the command parser, it represents a certain authority.

Step4: generation Trojan virus

  Find "Attacks" ----> "Packages" in the menu bar

  

  Here we choose "Windows Executable", set a good listener and generate the type of horse, eventually produce a exe program, copy the program to the target machine, run, and then see the machine to be controlled in the CS client.

  

 

Guess you like

Origin www.cnblogs.com/yuanshu/p/11616657.html