Art Of Exploitation
www.kapilsoni.in
www.kapilsoni.in
Armitage :-
 Armitage is GUI (Graphical User Interface) Tools For
Metasploit That can be used for Penetr...
www.kapilsoni.in
Important Modules Of Armitage :-
RHOST :- RHOST Stands for REMOTE HOST Means Victim.
If We Want Hack or R...
www.kapilsoni.in
Important Modules Of Armitage :-
PAYLOAD :- Payload is a way to communicate Victim’s
computer. Payload Pr...
www.kapilsoni.in
Important Modules Of Armitage :-
EXPLOITS :- Before Attack, You Must Choose Your
Weapon. Armitage Make Th...
www.kapilsoni.in
Graphical User Interface (GUI) Of Armitage :-
www.kapilsoni.in
Scanning Remote Host(Victim) In Armitage :-
www.kapilsoni.in
Finding Attacks For Victim PC In Armitage :-
www.kapilsoni.in
Triggering Vulnerability In Armitage :-
www.kapilsoni.in
After Attacking In Vulnerability :-
www.kapilsoni.in
Controlling Victim PC Through
METERPRETER :-
www.kapilsoni.in
Browsing Files Victim PC Through
METERPRETER :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Backdoor Through Armitage :-
www.kapilsoni.in
Thank Y
Upcoming SlideShare
Loading in …5
×

Armitage : Art of Exploitation

481
-1

Published on

Armitage is a tool from Metasploit that penetration tester use for system or network penetration testing. Armitage is a GUI tool that supports a lot modules, exploits, payloads, auxiliaries for perform testing.

Published in: Internet, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
481
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
35
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Armitage : Art of Exploitation

  1. 1. Art Of Exploitation www.kapilsoni.in
  2. 2. www.kapilsoni.in Armitage :-  Armitage is GUI (Graphical User Interface) Tools For Metasploit That can be used for Penetration Testing of System and Network.  It is a Main Or Easily Accessible Tool Of Metasploit Framework.  Also we can use it For Backdoor, Remote Access, Trojan Creation, Hack System or Network, Destroy Systems or Networks or Much More.  In Armitage We Need Four Important Modules-  RHOST (Victim’s IP Address)  LHOST (Attacker’s IP Address)  Payload  Exploit
  3. 3. www.kapilsoni.in Important Modules Of Armitage :- RHOST :- RHOST Stands for REMOTE HOST Means Victim. If We Want Hack or Remote Access of Victim’s Computer so We Necessary Need IP Address Of Victim’s Computer. Without IP Address Of Victim’s Computer We Can not hack or Take Remote Access of Computer. Setting RHOST By Command – >> SET RHOST 192.168.1.1 (Victim’s IP Address) LHOST :- LHOST Stands for LOCAL HOST Means Attacker. Many Exploits Demands of LHOST for Attacking Purpose or Remotely Access Purpose. Setting LHOST By Command – >> SET LHOST 192.168.1.2 (Attacker’s IP Address)
  4. 4. www.kapilsoni.in Important Modules Of Armitage :- PAYLOAD :- Payload is a way to communicate Victim’s computer. Payload Provides a Platform or a Medium to Communicate with Victim’s Computer. There are many types of Payload According to Work or Uses. The Most Usable or Workable Payload is METERPRETER. Payload Gives You Options To Access Victim’s Computer. Setting Payloads With the Help Of Command – >> set payload windows/meterpreter/reverse_tcp >> set payload windows/vncinject/reverse_tcp >> set payload windows/shell/reverse_tcp There are Above 250 Payloads are Available In Armitage.
  5. 5. www.kapilsoni.in Important Modules Of Armitage :- EXPLOITS :- Before Attack, You Must Choose Your Weapon. Armitage Make This Process Easy. For Example We Want to Hack Windows XP/2003, In Windows XP/2003 There are Many Types Of Vulnerability (Loophole), The Most Famous Or Attackable Vulnerability is MS_08_067. Now If We Want To Remote Access Of Victim’s Computer So We Can Enter On Victim’s PC With The Help Of Exploit. There Are Many Types Of Exploits Available According To Vulnerability Or Working. Setting Exploit With The Help Of Command – >> use windows/smb/ms08_067_netapi
  6. 6. www.kapilsoni.in Graphical User Interface (GUI) Of Armitage :-
  7. 7. www.kapilsoni.in Scanning Remote Host(Victim) In Armitage :-
  8. 8. www.kapilsoni.in Finding Attacks For Victim PC In Armitage :-
  9. 9. www.kapilsoni.in Triggering Vulnerability In Armitage :-
  10. 10. www.kapilsoni.in After Attacking In Vulnerability :-
  11. 11. www.kapilsoni.in Controlling Victim PC Through METERPRETER :-
  12. 12. www.kapilsoni.in Browsing Files Victim PC Through METERPRETER :-
  13. 13. www.kapilsoni.in Backdoor Through Armitage :-
  14. 14. www.kapilsoni.in Backdoor Through Armitage :-
  15. 15. www.kapilsoni.in Backdoor Through Armitage :-
  16. 16. www.kapilsoni.in Backdoor Through Armitage :-
  17. 17. www.kapilsoni.in Backdoor Through Armitage :-
  18. 18. www.kapilsoni.in Backdoor Through Armitage :-
  19. 19. www.kapilsoni.in Thank Y
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×