Monday, 14 May 2012

Learn how to use Armitage in Backtrack 5


Armitage 
Learn how to use Armitage in Backtrack 5 r2

Armitage

Introduction
  • Armitage is the GUI based tool for Metasploit , that shows the targets , exploits in the framework.
Features of Armitage 
  • With Armitage you can scan all the alive host on the network .
  • Armitage recommends exploits and will optionally run active checks to tell you which exploits will work. 
  • If these options fail, use the Hail Mary attack to unleash Armitage's smart automatic exploitation against your targets.
  • When you successfully exploit the target ,  With the click of a menu you will escalate your privileges, log keystrokes, browse the file system, and use command shells.
Requirements 
  • Latest Metasploit framework 4.3 or above 
  • Oracle Java 1.7

Step 1 : Open armitage on Backtrack 5.
  • Click on Backtrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > armitage
  • See the below image for more details how to open armitage n Backtrack 5 r2.

how to open armitage


Step 2 : Connect Armitage 
  • Click on the connect Button .
  • See the below image for more details -

how to connect armitage

Step 3 : Connecting Armitage 
  • It takes few minutes to connect . So have some patience.

connecting armitage


Step 4 :  Armitage Window 

  • Here is your armitage window shown below - 

Armitage Window

  • Armitage has 3 panels : -
  1. TARGET PANEL : It represents the computer ip address and other information .
  2. MODULE PANEL: It shows the auxiliary,exploit,payload and post.
  3. TABS PANELArmitage opens each dialog, console, and table in a tab below the module and target panels. Click the X button to close a tab.


Armitage Panels



Step 5 : Find the alive host on the Network 

  • In this step we have to search for the host .
  • Under the Nmap Scan, select the  option > Quick Scan (OS detect)
  • See the below image for more details .


Armitage quick scan



  • Here you have to enter the scan range . 
  • Here 192.168.222.0/24  this is  class C range.
  • Example image shown below - 


  • Your Scan is complete now .
  • If the nmap scan find the alive host , then it will be shown on your Target Panel .(As shown  Below )
  • See the below image for more details -
Armitage Scan


Step 6 : Finding Attacks 
  • Click on the Attacks > Find Attacks .
  • It will find the most suitable attack for host shown in the Target Panel.
  • See the image shown below -

  • When  attack analysis finished , it informs with a message shown in the image below -

Step 7 : Set the vulnerebility 
  • Right click on the host 
  • Click on smb 
  • Select the ms08_067_netapi  vulnerebility . 

  • Click on the checkbox - Use  a reverse connection .
  • Now click on the Launch Button .

Step 8 :
  • If the target host is vulnerable then its color changes to red .That means we can attack into the computer system.

The above image shows the meterpreter shell, if you want some hands-on experiance with meterpreter commands , then click this link given below -


EXAMPLES OF ARMITAGE 
Example 1 : Opening Command Shell
  • Right click on the host > Meterpreter1 >Interact > Command Shell 

  • Here is the command shell open in the Tab panel
  • See the below image for more details -


  • Type 'dir'  in the shell and you can see the remote system directories.
  • For more details see the below image -
Armitage Attack



  • This example shows  the system information .
  • Type the systeminfo in the command shell .



Example 2 : Take a Screenshot of Remote Desktop -
  • Click on the Meterpreter2 > Explore >Screenshot
  • See the image for more details - 
  • Next image shows the result .


  • Here it is the screenshot of the remote desktop .


Example 3 : Using Keylogger 
  • Click on the Meterpreter2 > Explore > Log Keystrokes 


  • When you click on the log keystrokes , small window pop-up .
  • Just click on the Launch Button if you don't want any changes .
  • Your keylogger is set . Now whenever Victim type anthing , it will display 




  • On the Victim PC 
  • I write some text and Ip address



  • Here is the result , whatever the victim types , it shows on the Log Keystrokes tab .
  • See the image shown below for more details - 



Example 4 : Browse Files 

  • Right click > Meterpreter2 > Explore > Browse Files 
  • Once you click in the Browse files , it will browse all the remote files in  a tab 
  • See the image below - 




  • Output : Browse Files 



Example 4 : Show processes running on the Remote Machine.

  • Right click > Meterpreter2 >Explore >Show Processes




  • Here is the output shown below - 


NEW LIVE EXAMPLES












                                        To learn Metasploit commands click this link 

To Learn Meterpreter Command 



This is how we can use the Armitage with many examples .

 If you like it then
 join us on
facebook 


THIS ARTICLE IS JUST FOR EDUCATIONAL PURPOSE ONLY /-

Reference website - www.fastandeasyhacking.com

10 comments:

Anonymous said...

hi,

after the connection is complete, no application runs. i have waited for several minutes and retried a couple of times but nothing happens. do i need to do some sort of update or install armitage itself?

HackingDNA.com said...
This comment has been removed by the author.
HackingDNA.com said...

> Yes you need update your armitage .

> And if agian its not run then switch and you are using backtrack 5 R1 then switch to Backtrack 5 R2.

> Thank you for your interest in this article , keep following www.hackingdna.com

Anonymous said...

bro wt 2 do in http://1.bp.blogspot.com/-JCDfLz-v1rs/T7DAglF_-WI/AAAAAAAACA8/yA7MzeKkCx8/s1600/Armitage1+%25289%2529.jpg as me getting this additional option tht step .. i am trying to Hack windows 7 Home Premium with backtrack 5R2

HackingDNA.com said...

If you are new to armitage than no need to change anything . Always Select AUTOMATIC TARGETING (As shown in your picture ) .

At last this just for setting - LHOST,LPORT,RHOST,RPORT etc .

Anonymous said...

it does help in hacking windows 7 thn

David Slovanko said...

No most of the vulnerabilities have been patched in Win 7 . . . Only way to exploit to do an client side attack . . .

Anonymous said...

bro it work,for out local network??

HackingDNA.com said...

keep following www.hackingdna.com

Anonymous said...

man, Im new to armitage and i was following your tutorials above once i have enterned the range of ip to scan on my local network i'm getting in in nmap console: "rttvar has grown to over 2.3 seconds decreasing to 2.0"

what should I Do? Im connected via wired connection to the wireless router directly and for testing purposes i turned on my laptop which is connected wireless...

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts