Armitage---Metasploit graphical interface attack

Source: Internet
Author: User

Attack environment: Target drone: metasploitable IP 192.168.162.129 attack kali2017 IP 192.168.162.128 Network Bridge I didn't start up when I opened it. Baidu said it was going to restart a Under Service networking service and reset msfdb that's the command service networking restartmsfdb InitThen do the following to start up there's definitely still a problem, but you can open it and use it first.

Open Kali input Armitage will pop up such a small box




Click Connect and a little hint pops up.




Click Yes (y)




It's like this when you open it (there's no 192.168.162.129 when you just opened it. I swept it last night, so I open it now.)




All right, we're starting to infiltrate a wave of metasploitable ~~~~o (∩_∩) O first determine the target to add a host that is the target of your attack hosts----->nmap scan----->quick Scan

This is a quick scan,




Then pop up a little box to enter your target drone address or a network segment.




And then I saw scan complete scanned.


Here, it shows a mainframe.

Well, it's better to be sure of the target, and then you find the vulnerability. Attacks-----> Find Attacks


All right, attack, attack analysis is complete. There's a big wave of loopholes for you to dig out.





Right click on this host has a attack this is the vulnerability that is available





Let's try these holes. I just found a bug with samba service. A small window confirms that the information of the attack can also be modified but there is no need to modify the click Launch to start the attack.




The following small box also shows the Metasploit which module of the call is set which information is good and intimate *********

When the host becomes red and is covered by two claws, it indicates that the host was successfully


And then look at what permissions you get right click on this host one more option is the shell click Interact to see what the situation is.





At the bottom there is a shell1 window and saw the $ sign successfully executing the command in flashing cat/root/flag.txt



This article empty city silence, this article authorized reprint from Hacker Club Forum (www.FreeDom1024.com).

Armitage---Metasploit graphical interface attack

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.