Description: This video, part of the SecurityTube Metasploit Framework Expert series, introduces Armitage. You'll learn the basic use of Armitage and see a demonstration. This video also covers some of the advanced features: dynamic workspaces, team collaboration, and reporting.
Tags: amitage , metasploit , reconnaissance , exploitation , post-exploitation , demo , smfe ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Quality stuff! Keep it comin'..
Great to see the developer presenting his own content. Look forward to seeing more developers doing the same through knowledge sharing platforms like Securitytube!
Thank You!
@k47hm4ndu thanks a lot. Armitage has evolved a lot and it really needed a good "conceptual" introduction. This seemed like a good opportunity to put it together and get the information out there. Glad you enjoyed it.
Can someone plz post it on youtube as this is blocked at my place.
Awesome stuff, the creator of Armitage demostrating Armitage :) , keep the awesome stuff going ...
wow, it's very excellent!! I've used metasploit framework but not used armitage because when I used it first it crashed!
now i works very well. thank your for your hardworking.
awesome!!!
first of all i'm sorry bcz of my eng mistakes
tnx for the video. armitage is realy friendly user and works like windows app
i want to ask
1. I scan the network and find vista pc,but when i want to find the suggest attacks,armitage cant find any kind of that !!!!is there any exploit for vista?!
2. how can we update the armitage?as i check there isn't any good attack against the win7.so how can we update it,and check is there any cool attack added for win7 or not!?
(plz say my eng problems to make me better :D )
tnx
Hey Buddy
Thanks for an Awesome Tool
And Your Video Quality is Awesome..
And Armitage is Very Intuitive
@zax
1. windows/smb/ms09_050_smb2_negotiate_func_index is a remote exploit for Vista SP1/SP2. Of course, the firewall needs to be off.
2. There are plenty of great attacks for Windows Vista and Windows 7. I demonstrated one... the Java Rhino exploit. Recent Java updates fix the Java Rhino loophole though. In the lecture, I explained that when attacking a modern system, it is extremely unlike that you will use a remote exploit to get a foothold. Firewalls work. Modern operating systems also have many mitigations to make bugs harder to exploit. Because of these security improvements, hackers have moved to targeting client-side applications.
3. This is beyond the scope of the screencast, but... try to think beyond exploits. A collection of exploits is not a magical key into any system. Just because you don't have an exploit for a given situation, doesn't mean you're out of luck. A favorite penetration tester attack is to send users a Java applet signed with a bogus certificate embedded into a fake or copied website. If the user accepts the applet, they've just given the tester access. No exploits were fired in the making of these hacks.
Thinking outside of the box (or exploits!) is key to being a successful penetration tester or network defender.
Coool .... Waiting For Others Videos... :P
Hi there ! . I gotta say that you inspire me . I didnt know nothing about security or hacking but two monts ago i learned a lot thks to armitage and metasploit . Armitage gave me the key of the knowledge cos i started to ask about how does it work .I mean , now i love everything about exploits , shellcode , payload , ect .You are so great , cos you share an incredible and hard work and you cant imagne how i aprecciate it. Seriously , you are so cool Raphael . Thank you so much . Sorry about my grammar.
pd : I gave a talk about armitage and metasploit 3 weeks ago on an importante evenet about hacking . Happy Hacking ! =)
awesome lecture.thank you rsmudge.
I would Like to See a button on the bottom RIGHT that EXPLOITS EVERYTHING(thats exploitable of course ) not a DB_autopwn but A smarter DB_AUTOPWN , or not im DRUNK
@sL0ps Attacks -> Hail Mary is what you want. This is much smarter than db_autopwn and it will exploit everything.
@ArmitageHacker ,
I tried to start Armitage from my Backtrack 5 r1 machine (hard disk installation) , the Metasploit Framework is updated to the latest version, but I keep getting an error in the progress where Armitage tries to connect to MSGRPC:
"Could not connect to Database .... Connection Refused. Check the hostname and port are correct and than postmaster is accepting TCP/IP connections."
Can you please help me?
@ringneckparrot Yes, I can explain. If you recall in the video, I said "if you can't connect Armitage to Metasploit, click the Help button."
If you click the Help button, you will be taken to a troubleshooting guide with everything I know that can go wrong and steps to fix them.
Right now your database is not running. On BackTrack Linux, there is a known issue where postgresql sometimes shuts down and does not come back up. You need to delete some files to fix it. The troubleshooting guide will tell you how to start the database manually, verify this known issue, and fix it.
If you weren't using BackTrack Linux and had just recently installed Metasploit, then I'd tell you that you don't have a database startup script. This is a recent "change" with the Metasploit Linux installers.
Both issues are well documented and addressed on the page that the Help button takes you to. Check it out.
Hey armitage hacker very nice video,but i have a problem pivoting outside network using armitage,1 pc own using backdoor and want to exploit other pc :D
may i have your msn ?
here mine juliojulioputra@hotmail.com
very very waiting for your help :D
@ArmitageHacker Ok, I will take a look later, thanks
@codenam_1it2 I'm glad to see that you're working to apply what I'm teaching in these videos. Ultimately though, providing 1-on-1 support for arbitrary situations with Armitage and Metasploit is beyond what I have the time to offer you. I don't address this in the video, but the most important skill for a penetration tester/hacker is knowing how to troubleshoot problems. My tool is truly useless to those who don't have or attempt to develop this skill... on their own.
I recommend that you work in phases with your learning and experimentation. Start with two virtual machines that you know you can exploit. Then, add a second interface to one of them and assign that second interface to a host-only network. Take the second machine and assign its one interface to the host only network. Then exploit the first machine, pivot, and attempt to exploit the second.
In this way, you're limiting what can go wrong, and changing one thing at a time. This is a much better way to learn.
waw very very nice comment for me,i succesfully exploit my VM,i learn from every information around internet. i have no teacher.Now in my case,i need someone who can tell me "The problem is ... " when i can't thinking again.
after 1 weeks 3 days i search for people want to help me,
from rapid7,backtrack-linux,indo-backtrack,youtube and even google can find it !
when i see your video i know you are a person that can help me.Other people can use metasploit + armitage easy on LAN,me too but HOW OVER LAN ?
i have team viewer on my backtrack so you can easily help me :D
i'm still waiting for you contact me dude.open msn 19 hours from now.And Merry cristhmas for you :D
Ps:sorry for bad english because i am from indonesia.
Im sorry ArmitageHacker if i said something wrong . It wasnt my intention. I just wanted to give you the thanks
@5n5 you didn't say something wrong. I didn't see a question in there, so I didn't respond. I appreciate the compliment. Thank you. And thank you for spreading the word on Armitage too.
armitage may you help me now ?
@codename_1it2 I'm happy to answer very specific Armitage questions on a public forum because the answers benefit everyone who comes back. I also answer specific and well worded Armitage questions via email. I do not provide one-on-one tutoring or mentoring to people I don't know. I'm sorry about this. I spend a lot of time developing this software and I regularly update my resources to make sure you have the best user experience possible. That said, every moment I spend providing one-on-one help to someone who is just getting the basics down is time taken away from developing this software, writing articles, and publishing screencasts that everyone benefits from. My time only goes so far. Sorry.
@ArmitageHacker Thanks for all the help my friend!
Dear All,
ArmitageHacker has been kind enough to create this video to help the community and offer this free of charge to us. We should not expect him to provide support on this thread for his wonderful tool. If you have any suggestions, feature requests etc. you can post them here or send it to him directly over email.
For students enrolled for the SMFE course, we will provide support in the student forums, for others, we will try to help as much as possible on this thread and on other videos on a best effort basis.
Thank you all for understanding!
SecurityTube Team
ok armitage thank you for information,may you see this video ?
my problem like that
http://www.youtube.com/watch?v=q8btRfLRNr4
there a many exploit i try ms08_netapi session no created
and try other exploit it said everithing should be fine waiting for session now,but i wait for 1 hours still like that ! OMG thanks guys for reply
@codename_1it2 Thanks, that video helps. At the time that video was made, there was an issue with pivoting in Metasploit. It was resolved in an update. My recommendation to you is to upgrade Metasploit to something beyond 3.7.0. If you do that, pivoting will work and the problem will be your local environment or the actions you're taking.
Hey guys Check my new video :D
This will make you understand what is my problem
if it waste your time just rewind the video to make fast
http://www.youtube.com/watch?v=W_c9GD4ovr8
and part 2
http://www.youtube.com/watch?v=7gEW0XPOeGg
Hello armitagehacker, no hosts appear when i scan my network, is there a bug there? i see that nmap scans them but no icons appear at the target list. Also when i check the whole network only my router appears as a target..how can i make it to show all of my targets? keep up the good work and happy new year!
@steve No bug showing hosts. You're doing something wrong on your end or you're misreading the NMap output.
thanks Armitagehacker for your time i was watching your rhino video and you mention that there is a way to inject i think it was called iframe attack! the victims computer with the server you started is this true? and i was wondering is there a way you can refresh there page and there browser might appear on the link of the server you created?????
@syberskater a common technique used by criminals is to find a flaw in a website. Maybe the site is on a shared host with poor permissions and the criminal is able to get at the database credentials for a bunch of WordPress users. Maybe the site has a persistent XSS flaw. Maybe there is some other way in. Once they do this, they would inject a URL that serves up an attack into the compromised site (how, depends on the attack vector). Now people who visit that site will receive some nasties if they're vulnerable to whatever is used. This won't necessarily get everyone, but it's still a gain for the criminal.
thanks for the information i was wondering if there is a book or videos out there? for me to understand the attack a lot better and protect my self from this attack. : ))))
I find your videos damn gd man. I believe no money can buy the video. I think vivek is doing a gd job compared to the guest lecturers. Yeah. Whilst I do not want to be racist, but this guest lecturer is stealing the limelight from vivek man.
If I can donate a few dollars, I will be happy though I dont have $$. I find securitytube to be insightful to the world of cyber security.
#ArmitageHacker
I have this problem mentioned above and I were following instructions from internet I could find but still same error
"Could not connect to Database .... Connection Refused. Check the hostname and port are correct and than postmaster is accepting TCP/IP connections."
I don't see that help button and I tried to run mysql and postgre and it said it works but still armitage doesn't start
btw.. one more thing I have login screen only with username, password and IP address I don't have this long big menu to select db driver and string...
Any idea?
Can someone help me out?
I do this armitage scan and all that pops up are 192.168.1.1-3 when I know there is actually 192.168.1.1-6, even worse, Armitage is mapping 192.168.1.1 and192.168.1.2 and 192.168.3 as all printers instead of it being a printer and two computers. I don't know much about CIDR so I assumed that is wrong, is it? My IP is 192.168.1.6 and my subnet is 255.255.255.248 meaning its 24 right? So in nmap search I put 192.168.1.0/24? Would I be wrong?
awesome work as always
I will really appreciate if you can please share the source to download this video because, I am unable to view this video as we have very poor connection here.
love love love love