© 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit.

Slides:



Advertisements
Similar presentations
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Advertisements

Armitage and Metasploit Penetration Testing Lab
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
Computer Security and Penetration Testing
Browser Exploitation Framework (BeEF) Lab
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Design Flexibility Interactive Report Viewing.
Virtual Machine Management
The Business of Penetration Testing
Configuring Task Scheduler Lesson 9. Skills Matrix Technology SkillObjective Domain SkillDomain # Understanding Task Scheduler Configure and manage the.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
Dennis  Application Security Specialist  WhiteHat Security  Full-Time Student  University of Houston – Main Campus ▪ Computer.
Configuring CIFS Upon completion of this module, you should be able to: Configure the Data Mover for a Windows environment Create and Join a CIFS Server.
Forensic Artifacts From A Pass The Hash (PtH) Attack
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Hands-On Virtual Computing
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
111 EMC CONFIDENTIAL—INTERNAL USE ONLY NMC -- NW Administration NMC Team NetWorker 7.3 TOI July 28, 2005.
The Microsoft Baseline Security Analyzer A practical look….
Module 5: Designing a Terminal Services Infrastructure.
1 Installation When this module is complete, you will be able to:  Set a static IP address for your laptop  Install the snom ONE software  Navigate.
Penetration Testing Training Day Penetration Testing Tools and Techniques – pt 1 Mike Westmacott, IRM plc Supported by.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 Chapter Overview Exploring New Features and Improvements Troubleshooting Using Help and Support Center Understanding Workgroups and Domains Logging On.
MIS Week 1 Site:
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
© 2010 – MAD Security, LLC All rights reserved Team Operations Collaborate with Armitage and Metasploit.
Kickstart Installation
Penetration Testing 101 (Boot-camp)
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
COORENOR COORENOR Web Portal COORENOR Agenda Where we are? (Summarize features of the COORENOR web portal.) Where are we going? (Show how to.
Retina Network Security Scanner
Workflow Demo: Upload, Review and Approve. Cpay : Users & Functionalities Customer AdministratorCustomer AuthorizerUploaderReviewerApproverInterceptor.
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
Linux Operations and Administration
MIS Week 1 Site:
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Splunk Enterprise Instructor: Summer Partain 3 Day Course.
2016 CSO System Training & Networking Conference / Copyright © 2016 #csoconf 2016 CSO System Training & Networking Conference / Copyright © 2016 #csoconf.
PostExploitation CIS 5930/4930 Offensive Computer Security Spring 2014.
CIS 4930 / CIS 5930 Offensive Computer Security Spring 2014 I only edited it again.
Hacking 101, Boot-camp Computer Security Group March 10, 2010 Mitchell Adair.
Penetration Testing Exploiting 2: Compromising Target by Metasploit tool CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
Packaging and Deploying Windows Applications
Nessus Vulnerability Scan
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Malware Reverse Engineering Process
Metasploit a one-stop hack shop
CIT 480: Securing Computer Systems
Exploiting Metasploitable
Backtrack Metasploit and SET
Metasploit Assignment
Web Application Penetration Testing ‘17
Intro to Kali Linux & Tools
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
Yating Liu July 2018 G-OnRamp workshop
Penetration Testing & Network Defense
Metasploit a short tutorial
Presentation transcript:

© 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit

Overview What is Armitage? User Interface Reconnaissance and Host Management Attack Post-Exploitation Maneuver Reporting

What is Armitage? User interface for Metasploit –Red Team collaboration –Advanced Post-exploitation –Time Saving Automation Fast moving: 30+ Updates in 2011 Distributed with Metasploit –BackTrack Linux Recommended

User Interface Visualize targets Find the right module Work on multiple things

User Interface

Reconnaissance Launch NMap –db_nmap –Hosts -> NMap Scans Not pivot friendly!

Reconnaissance MSF Scans –Launches 20+ Metasploit Auxiliary Modules –Works through a pivot

Import Hosts –Acunetix –Amap –Appscan –Burp Session –Foundstone –IP360 –Microsoft Baseline Security Analyzer –Nessus –NetSparker –NeXpose –Nmap –OpenVA –Qualys –Retina Reconnaissance

Host Management Table View –Displays hundreds of hosts –Same information as graph view

Host Management For large networks, use dynamic workspaces Group hosts by: –Network –Open services –Operating system –Session status Use Workspaces menu to switch

Attack: Remote Exploits Search for exploits –Use module browser Exploit recommendations –Attacks -> Find Attacks “Hail Mary” –Smarter db_autopwn

Attack: Remote Exploits

Attack: Client-side Search for module Optional: configure payload Launch module

Attack: Client-side Search for module Optional: configure payload Launch module

Attack: Client-side Search for module Optional: configure payload Launch module

Attack: Client-side Search for module Optional: configure payload Launch module

Post Exploitation Spy on the user –Screenshots, webcam, key logging Access the file system –Upload, download, TIMESTOMP Escalate your privileges –Token stealing, local exploits

Post Exploitation

Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans

Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans

Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans

Maneuver: Pass the Hash Use password hashes to authenticate as a user Requires an Active Directory domain

Maneuver: Pass the Hash Use password hashes to authenticate as a user Requires an Active Directory domain

Reporting Activity Logs –All console tabs logged –Organized by host/date Export Data –TSV and XML output of most data Quick Screenshot –Grab a screenshot of any tab

Summary What is Armitage? User Interface Reconnaissance and Host Management Attack Post-Exploitation Maneuver Reporting

Where to next? Armitage Homepage – Twitter