Guide InCharge,
Mrs.DiluMariyaJoseph
Presented By,
MinuElizPothen
MCA LE-S3
Roll No.:37
CONTENTS
 Introduction
• Kali Linux
• Penetration testing
 Armitage
• Introduction to Armitage
• Advantages & Disadvantages
 Steps to Implement Armitage
 Conclusion
 References
INTRODUCTION ON KALI LINUX
• Debian-based Linuxdistribution aimed at advanced
PenetrationTestingand Security Auditing.
• ReleaseDate: March 13th, 2013.
• Security-focusedversionof Linuxthat offers a large number
of toolsto seekoutweaknessesand secure your network.
• Kali containsseveraltools
• Information security tasks
• Penetration Testing,Securityresearch
• ComputerForensicsand ReverseEngineering
• Developers: Mati Aharoni,DevonKearnsand
Raphael Hertzog of offensive security.
• Open source
• 600 penetrationtestingtools + Applications
• Platforms - x86, x86-64, armel
• LatestRelease– Kali 2018.3
• Easyupgrade to futureversions
• Also called pentesting
• Testinga computer system/network /Web
application to findvulnerabilities.
Benefits:
• Intelligently manage vulnerabilities
• Avoid the cost of networkdowntime
• Meet regulatory requirements
Penetration Testing
Main Terms
• EXPLOIT- a piece of code written to take advantage of a
particular vulnerability in the system.
• PAYLOAD- simplescriptsthat thehackers utilize to
interact with a hacked system.
• LHOST- The IPaddress youwant your listener to bind to.
• LPORT- The port youwant your listener to bind to.
Armitage
Armitage is a scriptable red team collaboration
tool for Metasploit that visualizes targets,
recommends exploits, and exposes the advanced
post-exploitation features in the framework.
The Metasploit Framework is a Ruby-based, modular
penetration testing platform that enables you to write, test,
and execute exploit code.
The Metasploit Framework contains a suite of tools that
you can use to test security, vulnerabilities, enumerate
networks, execute attacks, and evade detection.
At its core, the Metasploit Framework is a collection of
commonly used tools that provide a complete environment
for penetration testing and exploit development.
Armitage
Features Of Armitage:
Share hosts, captured data, and downloaded
files
It provides GUI interface.
Advantages
• Open source
• Frequently updated
• User Interface
Disadvantage
• Can crash your system if not used wisely
How To Prevent Attack
This is the reason why we recommend that
everyone should use a quality anti-spyware
solution. These specialized software products can
both remove all active dangerous infections on the
device and also protect them at all times.
 Continues updating of the system
 Continues check for vulnerability
 Don’t click any random link while surfing the
internet.
 Never download unwanted file from
unknown source.
Some similar tools already Taken
Metasploit(Akash,Henel)
Ezsploit(Nidha,sulu)
Initialise Database
TO START ARMITAGE IN KALI LINUX OPEN A TERMINAL AND WRITE:
Database initialization
Implementing Armitage
Then accept the default values:
You will probably get a popup asking to start
Metasploit, click yes
you should now see the following:
Don’t worry about the connection refused it just takes
a while to load.
Armitage Gui
Navigate Payload>android
Victim device
System Information & Path
ipconfig
Directories
Make a Directory
Directory
Upload
Download
CONCLUSION
Armitage is one more way to access and use the
Metasploit framework.
 It provides an easy to use GUI interface making it
easier for the novice pentester /hacker.
Not only for accessing remote personal computers,
Armitage can be used to access android phones also.

Eliz seminar

  • 1.
  • 2.
    CONTENTS  Introduction • KaliLinux • Penetration testing  Armitage • Introduction to Armitage • Advantages & Disadvantages  Steps to Implement Armitage  Conclusion  References
  • 3.
    INTRODUCTION ON KALILINUX • Debian-based Linuxdistribution aimed at advanced PenetrationTestingand Security Auditing. • ReleaseDate: March 13th, 2013. • Security-focusedversionof Linuxthat offers a large number of toolsto seekoutweaknessesand secure your network. • Kali containsseveraltools • Information security tasks • Penetration Testing,Securityresearch • ComputerForensicsand ReverseEngineering
  • 4.
    • Developers: MatiAharoni,DevonKearnsand Raphael Hertzog of offensive security. • Open source • 600 penetrationtestingtools + Applications • Platforms - x86, x86-64, armel • LatestRelease– Kali 2018.3 • Easyupgrade to futureversions
  • 5.
    • Also calledpentesting • Testinga computer system/network /Web application to findvulnerabilities. Benefits: • Intelligently manage vulnerabilities • Avoid the cost of networkdowntime • Meet regulatory requirements Penetration Testing
  • 6.
    Main Terms • EXPLOIT-a piece of code written to take advantage of a particular vulnerability in the system. • PAYLOAD- simplescriptsthat thehackers utilize to interact with a hacked system. • LHOST- The IPaddress youwant your listener to bind to. • LPORT- The port youwant your listener to bind to.
  • 7.
    Armitage Armitage is ascriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework.
  • 8.
    The Metasploit Frameworkis a Ruby-based, modular penetration testing platform that enables you to write, test, and execute exploit code. The Metasploit Framework contains a suite of tools that you can use to test security, vulnerabilities, enumerate networks, execute attacks, and evade detection. At its core, the Metasploit Framework is a collection of commonly used tools that provide a complete environment for penetration testing and exploit development.
  • 9.
    Armitage Features Of Armitage: Sharehosts, captured data, and downloaded files It provides GUI interface.
  • 10.
    Advantages • Open source •Frequently updated • User Interface Disadvantage • Can crash your system if not used wisely
  • 11.
    How To PreventAttack This is the reason why we recommend that everyone should use a quality anti-spyware solution. These specialized software products can both remove all active dangerous infections on the device and also protect them at all times.
  • 12.
     Continues updatingof the system  Continues check for vulnerability  Don’t click any random link while surfing the internet.  Never download unwanted file from unknown source.
  • 13.
    Some similar toolsalready Taken Metasploit(Akash,Henel) Ezsploit(Nidha,sulu)
  • 14.
    Initialise Database TO STARTARMITAGE IN KALI LINUX OPEN A TERMINAL AND WRITE:
  • 15.
  • 16.
  • 17.
    You will probablyget a popup asking to start Metasploit, click yes you should now see the following: Don’t worry about the connection refused it just takes a while to load.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
    CONCLUSION Armitage is onemore way to access and use the Metasploit framework.  It provides an easy to use GUI interface making it easier for the novice pentester /hacker. Not only for accessing remote personal computers, Armitage can be used to access android phones also.