Port Scanning and Enumeration with Armitage
overview
Scenario
Armitage is a graphical cyber attack management tool for Metasploit, which is one of the most widely used frameworks for penetration testing. Armitage simplifies the use of Metasploit by providing a user-friendly interface, making it easier for users to manage exploits, payloads, and sessions during penetration tests. This lab covers the process of performing port scanning & enumeration with Armitage.
Tasks
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo1.ine.local.
Objective: Enumerate the target machine and perform port scanning using Armitage.
Tools
Armitage
Metasploit Framework
Solution
Step 1: Open the lab link to access the Kali GUI instance.

Step 2: Check if the target machine is reachable.
Command:

Step 3: Port scanning & enumeration with Armitage.
Before starting up Armitage, you will need to start the postgresql database service, this can be done by running the following command:
Commands:

We can start up Armitage by running the following command:
Command:
After starting up Armitage, you will be prompted to connect to the MSF database as shown in the following screenshot.

Click on "Yes."

Note: Armitage might take around 1 minute to get fully loaded.
After connecting to the MSF database, Armitage will open up as shown in the following screenshot.

We can get started by adding the IP address/domain name of the target machine; this can be done by clicking on Hosts on the toolbar and on Add Hosts in the sub-menu, as shown in the following screenshot.

You will then be prompted to add the host address of the target system as shown in the following screenshot.
Enter "demo1.ine.local" and click on "Add."

After adding the target machine's address, the system will be added to the top panel.
We can perform a port scan on the target system by right-clicking on the system and clicking on Scan as shown in the following screenshot.

This will begin the port scan on the target system, after which the results will be displayed in the bottom output pane as shown in the following screenshot.

We can also perform an Nmap port scan on the target system by clicking on the hosts menu in the toolbar and the Nmap Scan option in the submenu as shown in the following screenshot.

You will then be prompted to add the target machine's address as shown in the following screenshot.
Enter "demo1.ine.local" and click on "OK."

This will begin the Nmap port scan; wait for the scan to get completed.

After which, the results will be displayed in the output pane at the bottom as shown in the following screenshot.

You can now view the open ports and services running on the target system by right-clicking on the system and clicking on services as shown in the following screenshot.

As shown in the following screenshot, this will display the list of open ports and services discovered during the port scan.

Conclusion
In this lab, we explored the process of performing port scanning and enumeration with Armitage.
Last updated