Documente Academic
Documente Profesional
Documente Cultură
Introduction
Armitage is the GUI based tool for Metasploit , that shows the targets , exploits in the framework.
Features of Armitage
With Armitage you can scan all the alive host on the network . Armitage recommends exploits and will optionally run active checks to tell you which exploits will work. If these options fail, use the Hail Mary attack to unleash Armitage's smart automatic exploitation against your targets. When you successfully exploit the target , With the click of a menu you will escalate your privileges, log keystrokes, browse the file system, and use command shells.
Requirements
1. TARGET PANEL : It represents the computer ip address and other information . 2. MODULE PANEL: It shows the auxiliary,exploit,payload and post. 3. TABS PANEL : Armitage opens each dialog, console, and table in a tab below the module and target panels. Click the X button to close a tab.
Here you have to enter the scan range . Here 192.168.222.0/24 this is class C range. Example image shown below -
Your Scan is complete now . If the nmap scan find the alive host , then it will be shown on your Target Panel .(As shown Below ) See the below image for more details -
When attack analysis finished , it informs with a message shown in the image below -
Click on the checkbox - Use a reverse connection . Now click on the Launch Button .
Step 8 :
If the target host is vulnerable then its color changes to red .That means we can attack into the computer system.
The above image shows the meterpreter shell, if you want some hands-on experiance with meterpreter commands , then click this link given below http://www.hackingdna.com/2012/05/meterpreter-on-backtrack-5.html
Here is the command shell open in the Tab panel See the below image for more details -
Type 'dir' in the shell and you can see the remote system directories. For more details see the below image -
This example shows the system information . Type the systeminfo in the command shell .
Example 2 : Take a Screenshot of Remote Desktop Click on the Meterpreter2 > Explore >Screenshot See the image for more details Next image shows the result .
When you click on the log keystrokes , small window pop-up . Just click on the Launch Button if you don't want any changes . Your keylogger is set . Now whenever Victim type anthing , it will display
Here is the result , whatever the victim types , it shows on the Log Keystrokes tab . See the image shown below for more details -