How to use Armitage on Kali Linux
Hi all,
***This is for informational purposes only not for illegal use***
This is essentially a GUI way of using metasploit/meterpreter I hope you find it useful as many people like to use GUI rather than cmd line.
Lets get started ^__^
First navigate to Applications > Kali Linux > System Services > Metasploit > community / pro start ...... this will start the server/database

Then type armitage in the terminal window and accept the default values:

You will probably get a popup asking to start metasploit, click yes
you should now see the following:

Dont worry about the connection refused it just takes a while to load.
Now armitage will boot up if it asks you for the attack computer IP enter your IP Address.
Navigate to the Hosts tab > Nmap Scan > Quick Scan (OS Detect)

From here armitage will scan a range or a sigle IP Address of your choice then present it in the black window. Right click the target and click Scan

When the scan is complete expand the exploit > windows > smb and double click the ms08_67_netapi

This will bring up an attack confirmation window check the details and click launch

Confirmation of a successful exploit will look like this:

You can now right click the target and perform multiple commands

here is an example of the Interact "remote command shell"

This is just one of many exploits feel free to try out different ones in the tree
I hope you found this interesting ^__^ please comment,
Happy Hacking.
***This is for informational purposes only not for illegal use***
This is essentially a GUI way of using metasploit/meterpreter I hope you find it useful as many people like to use GUI rather than cmd line.
Lets get started ^__^
First navigate to Applications > Kali Linux > System Services > Metasploit > community / pro start ...... this will start the server/database

Then type armitage in the terminal window and accept the default values:

You will probably get a popup asking to start metasploit, click yes
you should now see the following:

Dont worry about the connection refused it just takes a while to load.
Now armitage will boot up if it asks you for the attack computer IP enter your IP Address.
Navigate to the Hosts tab > Nmap Scan > Quick Scan (OS Detect)

From here armitage will scan a range or a sigle IP Address of your choice then present it in the black window. Right click the target and click Scan

When the scan is complete expand the exploit > windows > smb and double click the ms08_67_netapi

This will bring up an attack confirmation window check the details and click launch

Confirmation of a successful exploit will look like this:

You can now right click the target and perform multiple commands

here is an example of the Interact "remote command shell"

This is just one of many exploits feel free to try out different ones in the tree

I hope you found this interesting ^__^ please comment,
Happy Hacking.