--- --- restore content begins
I. Introduction:
After penetration testing tool based on Java development for inter-teams work together, referred to as "CS".
CS is divided into client and server, under normal circumstances we call server to server team, the tool has a social function (social engineering), the server team can help us gather information and records management diary, in Linux require root privileges open team server, Windows server team to open the administrator.
Second, step
Step1: open team server (which is generally serverIP current machine IP)
Linux:teamserver serverIP password
Windows:teamserver.exe serverIP password
Step2: open client
Linux: ./ CobaltStrike or the Java - jav CobaltStrike.jar
Windows: Double-click CobaltStrike.exe or CobaltStrike.jar
Step3: Set up listeners in "Cobalt Strike" ----> "listeners" ----> click "Add"
beacon built-in listener, perform payload on the target host to obtain shell of CS in its type has dns / http / https / smb type;
binding foreign external listener, and MSF general linkage obtain meterpreter (shell) in the MSF, the shell can be understood as the command parser, it represents a certain authority.
Step4: generation Trojan virus
Find "Attacks" ----> "Packages" in the menu bar
Here we choose "Windows Executable", set a good listener and generate the type of horse, eventually produce a exe program, copy the program to the target machine, run, and then see the machine to be controlled in the CS client.