Armitage#

Armitage is a GUI interface for the Metasploit Framework, built by the same team. It’s great for collaboration between teams too.

Install#

git clone kalilinux/packages/armitage.git && cd armitage
bash package.sh

Armitage_Clone.png
Armitage_Build.png

Files should now be in ./release/unix/
Armitage_Built.png

The fun files here are:

  • TeamServer: Creates a server for the team to use. It must be passed

    • IP address

    • Shared Password

  • Armitage: Used to connect to a server. It gives you a screen to log in with. The username is a ‘nickname’

this is actually in the kali repos now, can just install armitage
same with teamserver


Prepare The Environment#

Since it uses metasploit, make sure its all worky

  • Start the DB

    • sudo systemctl start postgresql

  • Clear the DB

    • sudo msfdb delete

  • ReInitialise

    • sudo msfdb init


Start & connect#

Make sure youre in the right directory:

  • sudo teamserver [ip] [password]

    • Open a new terminal

  • armitage

    • teamserver gives the logins, use msf as your user and the above password

Armitage_Connect.png


Make It Do Fun Things#

Start a Scan#

Armitage_StartScan.png

You’ll get a window for a target, can do an IP or a subnet. Quick or OS detection doesnt give the -vv option though….
I did “10.10.247.213”
After a while, the scan completes and I get a new host on my display

Armitage_NewHost.png

Run Exploits#

You can now open exploits and pick your attack. Drag drop the attack to the host and you can now set your arguments and let it run
Armitage_StartEternalBlue.png

If it works, it gets all Thor-d
Armitage_exploited.png

Run POST modules#

You can then right click and take control of the shell
Most of the time, you will want to excalate this to a meterpreter shell. Right click the host and select your shell, then Post. It will expand your tree to show the post modules. Under manager is the shell_to_meterpreter module. Run it and will attempt to create a second shell for meterpreter.
Armitage_Meterpreter.png