Exploitation and Post Exploitation with Armitage

overview

Scenario

Armitage is a graphical cyber attack management tool for Metasploit, which is one of the most widely used frameworks for penetration testing. Armitage simplifies the use of Metasploit by providing a user-friendly interface, making it easier for users to manage exploits, payloads, and sessions during penetration tests. This lab covers the process of performing exploitation and post-exploitation with Armitage.


Tasks

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo1.ine.local.

Objective: Perform exploitation and post-exploitation on the target machine with Armitage.

Requirements:

  • This lab requires you to complete the previous lab Port Scanning & Enumeration with Armitage.

Tools

  • Armitage

  • Metasploit Framework

Solution

Step 1: Open the lab link to access the Kali GUI instance

Step 2: Port scanning & enumeration with Armitage

In this lab, we will be picking up from where we left off in the previous lab.

In the previous lab, we were able to perform a port scan on the target system and identify open ports and services running on the target system.

Analyzing the services running on the target system reveals that the Rejetto HTTP File Server running on port 80 can be exploited with a Metasploit module.

We can search for the exploit module by typing in the name of the service in the module pane as shown in the following screenshot.

Content Image

After clicking on the module, you will be prompted to configure the module options, more specifically, the RHOSTS option as shown in the following screenshot.

Enter "demo1.ine.local" as the "RHOSTS" value and click on "Launch."

Content Image

This will run the module against the target, after the module runs successfully the system pane will update the image of the target system to reflect the successful exploitation as shown in the following screenshot.

Content Image

We can obtain a meterpreter session on the target system by right-clicking on the system, navigating to Meterpreter 1 and clicking on interact and Meterpreter shell as shown in the following screenshot.

Content Image

Once we get the Meterpreter shell, we can run the following command to get the system information.

Command:

Content Image

We can dump user account hashes from the target system by right-clicking on the target system, clicking on Meterpreter 1 and dump hashes as shown in the following screenshot.

Content Image

The dumped hashes will be displayed in the console panel as shown in the following screenshot.

Content Image

Conclusion

In this lab, we explored the process of performing exploitation and post-exploitation with Armitage.

Last updated