Learn how to use Armitage in Backtrack 5













Introduction




  • Armitage is the GUI based tool for Metasploit , that shows the targets , exploits in the framework.



Features of Armitage 



  • With Armitage you can scan all the alive host on the network .

  • Armitage recommends exploits and will optionally run active checks to tell you which exploits will work. 

  • If these options fail, use the Hail Mary attack to unleash Armitage's smart automatic exploitation against your targets.

  • When you successfully exploit the target , 
    With the click of a menu you will escalate your privileges, log keystrokes, browse the file system, and use command shells.




Requirements 




  • Latest Metasploit framework 4.3 or above 

  • Oracle Java 1.7






Step 1 : Open armitage on Backtrack 5.

  • Click on Backtrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > armitage

  • See the below image for more details how to open armitage n Backtrack 5 r2.




                            



Step 2 : Connect Armitage 

  • Click on the connect Button .

  • See the below image for more details -


                                       






Step 3 : Connecting Armitage 




  • It takes few minutes to connect . So have some patience.


                                          

Step 4 :  Armitage Window 


  • Here is your armitage window shown below - 


                                            




  • Armitage has 3 panels : -



  1. TARGET PANEL : It represents the computer ip address and other information .

  2. MODULE PANEL: It shows the auxiliary,exploit,payload and post.

  3. TABS PANEL
    Armitage opens each dialog, console, and table in a tab below the module and target panels. Click the X button to close a tab
                             


Step 5 : Find the alive host on the Network 


  • In this step we have to search for the host .

  • Under the Nmap Scan, select the  option > Quick Scan (OS detect)

  • See the below image for more details .


                                    


  • Here you have to enter the scan range . 

  • Here 192.168.222.0/24  this is  class C range.

  • Example image shown below -


                                    


  • Your Scan is complete now .

  • If the nmap scan find the alive host , then it will be shown on your Target Panel .(As shown  Below )

  • See the below image for more details -


                                   

Step 6 : Finding Attacks 


  • Click on the Attacks > Find Attacks .

  • It will find the most suitable attack for host shown in the Target Panel.

  • See the image shown below -


                                       

  • When  attack analysis finished , it informs with a message shown in the image below -


                                        

Step 7 : Set the vulnerebility

  • Right click on the host 

  • Click on smb 

  • Select the ms08_067_netapi  vulnerebility .


                                         




  • Click on the checkbox - Use  a reverse connection .

  • Now click on the Launch Button .


                                          


Step 8 :




  • If the target host is vulnerable then its color changes to red .That means we can attack into the computer system.


                                          




No comments:

Post a Comment

All Tips And Tricks Information Computer tricks in tamil Hindi Mobile tips tricks 2013 HAcking tricks Airtel Idea Vodafone Tata Docomo Tricks internet