Privacy & Cookies

This website uses cookies. By continuing to use this site you are agreeing to our use of cookies.
Forum Index

Sections

View

Filter topics in this section

Stats

Threads6,796
Posts56,011
Authors6,241

How to use Armitage on Kali-Linux

Hacking & Security > Tutorials and Articles > How to use Armitage on Kali-Linux


    • 4810
    • 506

    1
    Hi all,

    ***This is for informational purposes only not for illegal use***

    This is essentially a GUI way of using metasploit/meterpreter I hope you find it useful as many people like to use GUI rather than cmd line.

    Lets get started ^__^

    First navigate to Applications > Kali Linux > System Services > Metasploit > community / pro start ...... this will start the server/database

    up_732094be71c788c35831f8af76c73adc.jpg

    Then type armitage in the terminal window and accept the default values:

    up_71f3f818da4047e8b52dc36313495e93.jpg

    You will probably get a popup asking to start metasploit, click yes
    you should now see the following:

    up_a3a0a414885924a9bbca5b43c4b25f7a.jpg

    Dont worry about the connection refused it just takes a while to load.
    Now armitage will boot up if it asks you for the attack computer IP enter your IP Address.
    Navigate to the Hosts tab > Nmap Scan > Quick Scan (OS Detect)

    up_9320b8d6918f3bce688644fe961469ab.jpg

    From here armitage will scan a range or a sigle IP Address of your choice then present it in the black window. Right click the target and click Scan

    up_412cd4f49762976761415f7e0fcd0710.jpg

    When the scan is complete expand the exploit > windows > smb and double click the ms08_67_netapi

    up_cd30c179e650ae19020f77c154b6c6aa.jpg

    This will bring up an attack confirmation window check the details and click launch

    up_94b0c32931ca18df043c19ef1970eb14.jpg

    Confirmation of a successful exploit will look like this:

    up_72148ee5063cce72b5ad0f6f56f7a283.jpg

    You can now right click the target and perform multiple commands

    up_a2154e3582135dd593c951f9723cfdfb.jpg

    here is an example of the Interact "remote command shell"

    up_1c43512a02a893548f3370f20cc9178e.jpg

    This is just one of many exploits feel free to try out different ones in the tree
    I hope you found this interesting ^__^ please comment,
    Happy Hacking.
    up_bac59c3405ec8a1a28d6347c0b6ed62c.jpg
Viewing 6 replies - 1 through 6 (of 6 total)
  • guuf
    guuf's profile picture

    • 10335
    • 199

    0
    Gninja seems to come up with very interesting methods and comments. I had been spending my time reviewing past Forum Post, articles, and going through the levels using/refining different method/techniques, but now, I’m reviewing and learning about a whole host of related hacking subjects. Way to go Gninja, excellent stuff! You are sending me into directions I never would have gone. Keep it up!
    I'd rather see folks doubt what's true than accept what isn't.
  • soldier_cyber
    soldier_cyber's profile picture

    • 3220
    • 2

    0
    thats the same exploit every one is making a video on well this is the real world not a virtual box why not use the java applet for windows 7 and 8 and it works
  • ADIGA
    ADIGA's profile picture

    • 9985
    • 348

    0
    nice thing reading this.
    soldier_cyber, try to look at the bright side, being the expert you are, please note some noobs like us use linux and can not use java applet for windows 7 and 8, some of us has computer with specs that can not run java
    I Hate Signatures.
  • th3fjong
    th3fjong's profile picture

    • 1735
    • 145

    0
    Why not use SE Toolkit insteed ?
    clone a website every person in the world knows uses java and inject them that way?
    why not use SE toolkit and get an injection file and than either Crypt it with a crypter or edit it with hexedit and start spreading the file trough sites like facebook, twitter, omegle etc.?
    Fault confessed is half redressed!
  • th3fjong
    th3fjong's profile picture

    • 1735
    • 145

    0
    personally I love using omegle, so many horny stupid old pedofile men!
    spoof the extension with .jpg, bind the file to a hot looking girl and say you're a naughty looking girl looking for older men?
    I had within 2 hours of work 14 connections :b
    Fault confessed is half redressed!
  • nakador
    nakador's profile picture

    • 1095
    • 2

    0
    Exploit failed [unreachable]: Rex::ConnectionRefused The connection was refused by the remote host
    anyhelp ?
Viewing 6 replies - 1 through 6 (of 6 total)
You must be logged in to reply to this topic