Download presentation
Presentation is loading. Please wait.
Published byMadeline Bradford Modified over 9 years ago
1
© 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit
2
Overview What is Armitage? User Interface Reconnaissance and Host Management Attack Post-Exploitation Maneuver Reporting
3
What is Armitage? User interface for Metasploit –Red Team collaboration –Advanced Post-exploitation –Time Saving Automation Fast moving: 30+ Updates in 2011 Distributed with Metasploit –BackTrack Linux Recommended
4
User Interface Visualize targets Find the right module Work on multiple things
5
User Interface
6
Reconnaissance Launch NMap –db_nmap –Hosts -> NMap Scans Not pivot friendly!
7
Reconnaissance MSF Scans –Launches 20+ Metasploit Auxiliary Modules –Works through a pivot
8
Import Hosts –Acunetix –Amap –Appscan –Burp Session –Foundstone –IP360 –Microsoft Baseline Security Analyzer –Nessus –NetSparker –NeXpose –Nmap –OpenVA –Qualys –Retina Reconnaissance
9
Host Management Table View –Displays hundreds of hosts –Same information as graph view
10
Host Management For large networks, use dynamic workspaces Group hosts by: –Network –Open services –Operating system –Session status Use Workspaces menu to switch
11
Attack: Remote Exploits Search for exploits –Use module browser Exploit recommendations –Attacks -> Find Attacks “Hail Mary” –Smarter db_autopwn
12
Attack: Remote Exploits
13
Attack: Client-side Search for module Optional: configure payload Launch module
14
Attack: Client-side Search for module Optional: configure payload Launch module
15
Attack: Client-side Search for module Optional: configure payload Launch module
16
Attack: Client-side Search for module Optional: configure payload Launch module
17
Post Exploitation Spy on the user –Screenshots, webcam, key logging Access the file system –Upload, download, TIMESTOMP Escalate your privileges –Token stealing, local exploits
18
Post Exploitation
19
Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans
20
Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans
21
Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans
22
Maneuver: Pass the Hash Use password hashes to authenticate as a user Requires an Active Directory domain
23
Maneuver: Pass the Hash Use password hashes to authenticate as a user Requires an Active Directory domain
24
Reporting Activity Logs –All console tabs logged –Organized by host/date Export Data –TSV and XML output of most data Quick Screenshot –Grab a screenshot of any tab
25
Summary What is Armitage? User Interface Reconnaissance and Host Management Attack Post-Exploitation Maneuver Reporting
26
Where to next? Armitage Homepage –http://www.fastandeasyhacking.com/http://www.fastandeasyhacking.com/ Twitter –@armitagehacker
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.