Changes

From Security Weekly Wiki
Jump to navigationJump to search
18 bytes added ,  19:36, 9 December 2010
Now we get a GUI about connecting to the database and our Metasploit XMLRPC instance:
[[file:arm1.jpg]]
Put in the correct information and off we go. Yay, a GUI:
[[file:arm2.jpg]]
Once started, we need some targets. How about some targets from Nessus? We can import Targets into Armitage from all sorts of inputs…
[[file:arm3.jpg]]
From a scan completed Nessus scan, I select only the high severity results, then downlaod the report.
[[file:arm4.jpg]]
I picked the .nessus (XML) v1. I tried the v2 but had a crash on import. this works repeatedly. (of course we can use nmap, even direct from Armitage.)
[[file:arm5.jpg]]
Oooh, look, targets! Ok, so what do we attack with? Let's have Armitage find attacks with Attacks, find attacks by port.
[[file:arm6.jpg]]
Once done we get this nice attack menu now when we right click. We can go through them methodically, which can be good…
[[file:arm7.jpg]]
or we can go for the Hail Mary, otherwise known as db_autopwn.
[[file:arm8.jpg]]
It works, for sure, but I'm not convinced. I thin the by port works better (more tries) than by vulnerability…by vulnerability, I've had it try stuff that didn't work across the board and have them be vulnerable to other items. I think this stems form the fact that we haven;t really discovered much about the targets. Either way, it will fire off a whole bunch of attacks:
[[file:arm9.jpg]]
Once an attack is successful, we can interact directly with a meterpreter session, or continue to navigate the menus:
[[file:arm10.jpg]]
So, it works, it works well, but there are some issues in how I like to use it for legitimate purposes. For example:
940

edits

Navigation menu