Exploitation and Post Exploitation with Armitage
overview
Scenario
Armitage is a graphical cyber attack management tool for Metasploit, which is one of the most widely used frameworks for penetration testing. Armitage simplifies the use of Metasploit by providing a user-friendly interface, making it easier for users to manage exploits, payloads, and sessions during penetration tests. This lab covers the process of performing exploitation and post-exploitation with Armitage.
Tasks
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo1.ine.local.
Objective: Perform exploitation and post-exploitation on the target machine with Armitage.
Requirements:
This lab requires you to complete the previous lab Port Scanning & Enumeration with Armitage.
Tools
Armitage
Metasploit Framework
Solution
Step 1: Open the lab link to access the Kali GUI instance
Step 2: Port scanning & enumeration with Armitage
In this lab, we will be picking up from where we left off in the previous lab.
In the previous lab, we were able to perform a port scan on the target system and identify open ports and services running on the target system.
Analyzing the services running on the target system reveals that the Rejetto HTTP File Server running on port 80 can be exploited with a Metasploit module.
We can search for the exploit module by typing in the name of the service in the module pane as shown in the following screenshot.

After clicking on the module, you will be prompted to configure the module options, more specifically, the RHOSTS option as shown in the following screenshot.
Enter "demo1.ine.local" as the "RHOSTS" value and click on "Launch."

This will run the module against the target, after the module runs successfully the system pane will update the image of the target system to reflect the successful exploitation as shown in the following screenshot.

We can obtain a meterpreter session on the target system by right-clicking on the system, navigating to Meterpreter 1 and clicking on interact and Meterpreter shell as shown in the following screenshot.

Once we get the Meterpreter shell, we can run the following command to get the system information.
Command:

We can dump user account hashes from the target system by right-clicking on the target system, clicking on Meterpreter 1 and dump hashes as shown in the following screenshot.

The dumped hashes will be displayed in the console panel as shown in the following screenshot.

Conclusion
In this lab, we explored the process of performing exploitation and post-exploitation with Armitage.
Last updated