Armitage: Cyber Attack Management GUI for Metasploit
Armitage is a powerful scriptable tool useful in collaboration with red team operations while dealing with cyber attacks using Metasploit, developed by Raphael Mudge. Therefore, it works as the GUI front-end for Metasploit. It allows to visualize targets, it recommends exploits and also provides advanced results related to the post-exploitation features within a framework.
Armitage is obviously very useful in carrying out red team operations, but also for all “new” hackers, that are still not feeling comfortable while using CLI. It can help all beginners learn hacking with Metasploit much easier.
Armitage: Graphical Cyber Attack Management Tool for Metasploit
Armitage multiplies the operations performed by red teams. The main goal of this tool is to enable security experts to use Metasploit in collaboration which enables the team to communicate in a single Metasploit instance. It has a server component which can allow sharing of data and use of same sessions within a team.
When using Armitage you have the option of performing your own scans on a potential target, but you can also import the data available on other scanners .This tool has a UI that is very easy to use and as a result you can be able to see all the targets that are connected or the ones that have been scanned. If an attack is successful the tool will expose all the post exploitation tools that are in Meterpreter agent.
How it works?
Armitage Modules
Once installed and configured, you’ll see the following Metasploit modules:
- auxiliary
- exploit
- payload
- post
You can use the Module area to view a list of potential exploits and also allows the selection of a payload to be delivered. This area also has a wildcard which can be used to search a payload or the exploit that you may require. It is also from this area that you can get the auxiliary modules needed in launching brute force attacks on passwords.
The target area provides you with a detailed list of the host machines that have been found. A red color and a thunderstorm like effect is applied on targets that have been hacked. The console area will allow you to view and navigate through the available folders with ease.
Features:
- Automated exploitation
- Key logging (captures keystrokes)
- Privilege escalation
- Cortana
- VNC (allows interactions with target host)
- Browse files(allows file uploads, downloads and deleting)
- DNS Enumeration
- MSF Scans
- Database Maintenance
- Nmap Scans
- Remote Exploits
- Pivoting
- Payload Handler
- Session Passing
- Script Management
Supported Platforms
- Linux, Windows, OS X
Requirements
- Java 1.7 Oracle
- Metasploit framework with all its dependencies
- Nmap
- PostgreSQL Database
Armitage Install
First, you have to download the Armitage.
Kali Linux users, run the following command:
$ kali apt-get install armitage
Open the Terminal start the postgreSQL server:
$ kali > service postgresql start
Then start the Metasploit:
$ kali > msfconsole
Finally, start the Armitage:
$ kali > armitage
For detailed usage guide, click the “documentation” button below.