Hack a IP with Armitage!
This Does NOT show how to install armitage, go to http://fastandeasyhacking.com to learn how to install.
Prerequisites:
Armitage and Metasploit installed.
A MySql user, database, and password.
Armitage allready set up.
Begin!
First you will need to start Armitage.
In the terminal type:
>>>sudo armitage
![[Image: armitage1.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uVG3hAqoDAOwJKwr05XJKy7OQAPdhJ8JObzMiGM40_xqr0R5f4qJffeQioCltY2wSEw6A1RjMwT4LLRO__MZc230BobkPPGEYayejWtCo51z6AAmB2v4Pj=s0-d)
Now, a login box will appear.
Put your mysql information in it:
host: 127.0.0.1 (your localhost)
Port: 55553 (metasploit's default port)
User: your mysql username for the database you will use for armitage
Pass: the password for the mysql user
Hit connect
![[Image: armitage2.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sAzZYBrGQG01e7t2u999SHC7YSchVv-24HRfVqOIKKHasxl6o0lnhAv43o-JPFtaw5CyEOpAJMtqWx4_TmWmM7X3tLRbIQj5dxBygJGQkoyxgKtCDadRMw=s0-d)
A new box will pop up saying something such as:
"A metasploit RPC server is not running"
Click on Yes.
A loading box will appear which says "Java Connection refused"
![[Image: armitage3.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tURuFExZFzFr818Ahof5bxWu_WPzP5uzfYHunsjlw1EKMLky7Yv98KI44fnklyFAFt5dOWsIiuRcfE96ludHQxLt6-bi2z_TWIRRaghUX1HduWlA=s0-d)
That is normal, armitage is gathering all the ruby plugins into armitage's GUI.
Armitage will look somewhat like this:
Now, I have a windows XP SP2 running on a Virtual Machine with the ip of 192.168.0.14
To scan your network for vulnerable hosts, do this:
On the tool bar> Hosts>Nmap Scan> Quick OS Detect (in this case you don't need to do any long scans as we will be targetting a Win XP)
now type the ROUTER'S IP and the whole network such as: 192.168.1.1/24 ( /24 is the ip range on the network)
After finding all the PC's on the network, you should see one appear that you like
![[Image: armitage5.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vypCSzOQOgfTE0Vi9PIUcMWrFuvgFk1zfBD-iQcPrLOmBFda3k_2kLx13c4n77FD0PWxKgMGJvL9oOAgoMGCTuQPxYZ9AbmT7L0lQhSR5DBAd-gvg=s0-d)
Now, click on that target, and select Toolbar> Attacks> Find attacks.
It will look for all attacks for that OS.
Exploit time!
Right click on the target. A new menu will appear called: Attack.
You can try any of those attacks, or use the SMB attack as we will.
Click on Attack>SMB>ms08_067_netapi
This will appear:
![[Image: armitage6.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vgxOo4EydB7p8cr56ZobLL6rFrb-s0VASH0-X0NRPpRfYCub__jo1lu8JNzfOqKCrMfrvdvEE-m3WdjUaJfSiGTehkUy5RG95piNP91L9l6AkwzKhrDhI=s0-d)
Check the Reverse Connection, and unless you know what you are doing, you don't need to change any other items.
Click Launch.
Your Console will run until it shows this:
Congratulations, you have exploited a PC Just with a IP address! :)
I will be creating Part 2 of this tutorial which will be Using the Meterpreter!
This tutorial was created by TechLab AKA Inventor!
This Does NOT show how to install armitage, go to http://fastandeasyhacking.com to learn how to install.
Prerequisites:
Armitage and Metasploit installed.
A MySql user, database, and password.
Armitage allready set up.
Begin!
First you will need to start Armitage.
In the terminal type:
>>>sudo armitage
Now, a login box will appear.
Put your mysql information in it:
host: 127.0.0.1 (your localhost)
Port: 55553 (metasploit's default port)
User: your mysql username for the database you will use for armitage
Pass: the password for the mysql user
Hit connect
A new box will pop up saying something such as:
"A metasploit RPC server is not running"
Click on Yes.
A loading box will appear which says "Java Connection refused"
That is normal, armitage is gathering all the ruby plugins into armitage's GUI.
Armitage will look somewhat like this:
Image has been scaled down 37% (870x453). Click this bar to view original image (1365x710). Click image to open in new window.
Now, I have a windows XP SP2 running on a Virtual Machine with the ip of 192.168.0.14
To scan your network for vulnerable hosts, do this:
On the tool bar> Hosts>Nmap Scan> Quick OS Detect (in this case you don't need to do any long scans as we will be targetting a Win XP)
now type the ROUTER'S IP and the whole network such as: 192.168.1.1/24 ( /24 is the ip range on the network)
After finding all the PC's on the network, you should see one appear that you like
Now, click on that target, and select Toolbar> Attacks> Find attacks.
It will look for all attacks for that OS.
Exploit time!
Right click on the target. A new menu will appear called: Attack.
You can try any of those attacks, or use the SMB attack as we will.
Click on Attack>SMB>ms08_067_netapi
This will appear:
Check the Reverse Connection, and unless you know what you are doing, you don't need to change any other items.
Click Launch.
Your Console will run until it shows this:
Image has been scaled down 37% (870x450). Click this bar to view original image (1365x705). Click image to open in new window.
Congratulations, you have exploited a PC Just with a IP address! :)
I will be creating Part 2 of this tutorial which will be Using the Meterpreter!
This tutorial was created by TechLab AKA Inventor!






0 Comments:
Post a Comment