How to Use Armitage For Discovering Vulnerabilities



Armitage is a graphical interface to Metasploit , developed in Java (multiplatform )to visualize the target machines , recommended exploits and functionality advanced framework metasploit .


Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you
==  Installing  ==
Armitage is pre- installed on the gnome3 version of Kali Linux .
== using armitage =
start metasploit community/pro tool
==>> application>kali linux>system services>metasploit> community / pro start


and you should see this :


to start armitage , simply go to the menu :
“Applications > Kali Linux > Exploitation Tools > Network Exploitation > armitage”.


and then click on “connect” in windows that appears


This time I have a warning telling me that the RPC server is not running and not accepting connection.The alert asks if you want that one starts the RPC server for us.


A progress window is displayed at length.


Here we are with the operation window of armitage .


Now We will scan all  machines on our network.I have connected a windows vista pc as a test machine .


To do this simply enter the address of the network.


Once the scan is completed , it is suggested to use the search tool to find exploits.


We now see all the machines connected to the local network.



We now see all the machines connected to the local network.





We will now search the database attacks available on the network.



Go to the ” Attacks ” menu and then select “Find Attacks ” .


Once the search has finished , an alert indicates that a menu is now available in right-click on the target.


We will initially checker the smb feat .
We discover that the target is exploitable.
In a feat configuration window, we had a notice that only the Machine up windows xp has a fail .
A red computer with electrical jolts indicates a compromised host.


so we can now make some of attacks to this computer like browsing files , taking screenshot of desktop or webcamshot .
and as an exemple we gonna take a screenshot of the computer,


and we can see here a screnshot of the desktop :


wee can also browse files , as we can see here


NOTE: This is a Educational Purpose Only..

Comments


  1. My life was falling apart, I was being cheated and abused, I had to know the truth and needed proof. I contacted a private investigator that linked me with onlineghost who took care of the hack job. He hacked his iPhone,Facebook,Instagram, Whats app, twitter and email account. I got all I wanted as proof . I”m glad i had a proven truth he was cheating . Contact him for any hack job. Tell him i referred you to him, he will surely meet your hack need. Contact: onlineghosthacker247@ gmail .com

    ReplyDelete

Post a Comment

Popular Posts