Attack environment: Target drone: metasploitable IP 192.168.162.129 attack kali2017 IP 192.168.162.128 Network Bridge I didn't start up when I opened it. Baidu said it was going to restart a Under Service networking service and reset msfdb that's the command service networking restartmsfdb InitThen do the following to start up there's definitely still a problem, but you can open it and use it first.
Open Kali input Armitage will pop up such a small box
Click Connect and a little hint pops up.
Click Yes (y)
It's like this when you open it (there's no 192.168.162.129 when you just opened it. I swept it last night, so I open it now.)
All right, we're starting to infiltrate a wave of metasploitable ~~~~o (∩_∩) O first determine the target to add a host that is the target of your attack hosts----->nmap scan----->quick Scan
This is a quick scan,
Then pop up a little box to enter your target drone address or a network segment.
And then I saw scan complete scanned.
Here, it shows a mainframe.
Well, it's better to be sure of the target, and then you find the vulnerability. Attacks-----> Find Attacks
All right, attack, attack analysis is complete. There's a big wave of loopholes for you to dig out.
Right click on this host has a attack this is the vulnerability that is available
Let's try these holes. I just found a bug with samba service. A small window confirms that the information of the attack can also be modified but there is no need to modify the click Launch to start the attack.
The following small box also shows the Metasploit which module of the call is set which information is good and intimate *********
When the host becomes red and is covered by two claws, it indicates that the host was successfully
And then look at what permissions you get right click on this host one more option is the shell click Interact to see what the situation is.
At the bottom there is a shell1 window and saw the $ sign successfully executing the command in flashing cat/root/flag.txt
This article empty city silence, this article authorized reprint from Hacker Club Forum (www.FreeDom1024.com).
Armitage---Metasploit graphical interface attack