370 likes | 905 Views
Armitage. A Power User’s Interface for Metasploit. Overview. What is Armitage? User Interface Reconnaissance and Host Management Attack Post-Exploitation Maneuver Reporting. What is Armitage?. User interface for Metasploit Red Team collaboration Advanced Post-exploitation
E N D
Armitage A Power User’s Interface for Metasploit
Overview • What is Armitage? • User Interface • Reconnaissance and Host Management • Attack • Post-Exploitation • Maneuver • Reporting
What is Armitage? • User interface for Metasploit • Red Team collaboration • Advanced Post-exploitation • Time Saving Automation • Fast moving: 30+ Updates in 2011 • Distributed with Metasploit • BackTrack Linux Recommended
User Interface • Visualize targets • Find the right module • Work on multiple things
Reconnaissance • Launch NMap • db_nmap • Hosts -> NMap Scans • Not pivot friendly!
Reconnaissance • MSF Scans • Launches 20+ Metasploit Auxiliary Modules • Works through a pivot
Reconnaissance • NetSparker • NeXpose • Nmap • OpenVA • Qualys • Retina • Import Hosts • Acunetix • Amap • Appscan • Burp Session • Foundstone • IP360 • Microsoft Baseline Security Analyzer • Nessus
Host Management • Table View • Displays hundreds of hosts • Same information as graph view
Host Management • For large networks, use dynamic workspaces • Group hosts by: • Network • Open services • Operating system • Session status • Use Workspaces menu to switch
Attack: Remote Exploits • Search for exploits • Use module browser • Exploit recommendations • Attacks -> Find Attacks • “Hail Mary” • Smarter db_autopwn
Attack: Client-side • Search for module • Optional: configure payload • Launch module
Attack: Client-side • Search for module • Optional: configure payload • Launch module
Attack: Client-side • Search for module • Optional: configure payload • Launch module
Attack: Client-side • Search for module • Optional: configure payload • Launch module
Post Exploitation • Spy on the user • Screenshots, webcam, key logging • Access the file system • Upload, download, TIMESTOMP • Escalate your privileges • Token stealing, local exploits
Maneuver • Host Discovery: ARP Scan • Pivoting Setup • Metasploit Scans
Maneuver • Host Discovery: ARP Scan • Pivoting Setup • Metasploit Scans
Maneuver • Host Discovery: ARP Scan • Pivoting Setup • Metasploit Scans
Maneuver: Pass the Hash • Use password hashes to authenticate as a user • Requires an Active Directory domain
Maneuver: Pass the Hash • Use password hashes to authenticate as a user • Requires an Active Directory domain
Reporting • Activity Logs • All console tabs logged • Organized by host/date • Export Data • TSV and XML output of most data • Quick Screenshot • Grab a screenshot of any tab
Summary • What is Armitage? • User Interface • Reconnaissance and Host Management • Attack • Post-Exploitation • Maneuver • Reporting
Where to next? • Armitage Homepage • http://www.fastandeasyhacking.com/ • Twitter • @armitagehacker