Elevate with an Exploit
1) elevate
2) elevate [EXPLOIT] [LISTENER]
You may also launch one of these exploits through [beacon] -> Access -> Elevate.
Choose a listener, select an exploit, and press Launch to run the exploit. This dialog is a front-end for Beacon's elevate command.
You may add privilege escalation exploits to Cobalt Strike through the Elevate Kit. The Elevate Kit is an Aggressor Script that integrates several open source privilege escalation exploits into Cobalt Strike. https://github.com/rsmudge/ElevateKit.
3) runasadmin
4) runasadmin [EXPLOIT] [COMMAND + ARGS]
Cobalt Strike separates command elevator exploits and session-yielding exploits because some attacks are a natural opportunity to spawn a session. Other attacks yield a ârun this commandâ primitive. Spawning a session from a ârun this commandâprimitive puts a lot of weaponization decisions (not always favorable) in the hands of your tool developer. With runasadmin, itâs your choice to drop an executable to disk and run it, to run a PowerShell one-liner, or to weaken the target in some way.
If youâd like to use a PowerShell one-liner to spawn a session, go to [beacon] -> Access -> Oneliner.
This dialog will setup a localhost-only webserver within your Beacon session to host a payload stage and return a PowerShell command to download and run this payload stage.
This webserver is one-use only.Once itâs connected to once, it will clean itself up and stop serving your payload.
If you run a TCP or SMB Beacon with this tool, you will need to use connect or link to assume control of the payload manually. Also, be aware that if you try to use an x64 payloadâthis will fail if the x86 PowerShell is in your $PATH.
Cobalt Strike does not have many built-in elevate options. It is easy to integrate privilege escalation exploits via Cobalt Strikeâs Aggressor Script programming language though. To see what this looks like, download the Elevate Kit (https://github.com/cobalt-strike/ElevateKit). The Elevate Kit is an Aggressor Script that integrates several open source privilege escalation exploits into Cobalt Strike.
Last updated