How to use Armitage on Kali Linux

Hi all,

***This is for informational purposes only not for illegal use***

This is essentially a GUI way of using metasploit/meterpreter I hope you find it useful as many people like to use GUI rather than cmd line.

Lets get started ^__^

First navigate to Applications > Kali Linux > System Services > Metasploit > community / pro start ...... this will start the server/database

up_732094be71c788c35831f8af76c73adc.jpg

Then type armitage in the terminal window and accept the default values:

up_71f3f818da4047e8b52dc36313495e93.jpg

You will probably get a popup asking to start metasploit, click yes
you should now see the following:

up_a3a0a414885924a9bbca5b43c4b25f7a.jpg

Dont worry about the connection refused it just takes a while to load.
Now armitage will boot up if it asks you for the attack computer IP enter your IP Address.
Navigate to the Hosts tab > Nmap Scan > Quick Scan (OS Detect)

up_9320b8d6918f3bce688644fe961469ab.jpg

From here armitage will scan a range or a sigle IP Address of your choice then present it in the black window. Right click the target and click Scan

up_412cd4f49762976761415f7e0fcd0710.jpg

When the scan is complete expand the exploit > windows > smb and double click the ms08_67_netapi

up_cd30c179e650ae19020f77c154b6c6aa.jpg

This will bring up an attack confirmation window check the details and click launch

up_94b0c32931ca18df043c19ef1970eb14.jpg

Confirmation of a successful exploit will look like this:

up_72148ee5063cce72b5ad0f6f56f7a283.jpg

You can now right click the target and perform multiple commands

up_a2154e3582135dd593c951f9723cfdfb.jpg

here is an example of the Interact "remote command shell"

up_1c43512a02a893548f3370f20cc9178e.jpg

This is just one of many exploits feel free to try out different ones in the tree :)
I hope you found this interesting ^__^ please comment,
Happy Hacking.