PowerShell Empire Tutorials – Empire TO Meterpreter ShellCode Injection SSL Tutorial


Overview:
In addition to having the concept of foreign Empire listeners, Empire also implements the ability to pass sessions from Empire agents to Meterpreter handlers. It does this through the Invoke–Shellcode.ps1 PowerSploit module, which can inject shellcode to stager meterpreter/reverse_http and meterpreter/reverse_ listeners into foreign processes.

Steps:
This time we create a PEM file. Then setup a meterpreter listener in Metasploit and execute shell code injection between Empire and Metasploit to spawn an Encrypted Meterpreter Session.