Port Scanning and Enumeration with Armitage

overview

Scenario

Armitage is a graphical cyber attack management tool for Metasploit, which is one of the most widely used frameworks for penetration testing. Armitage simplifies the use of Metasploit by providing a user-friendly interface, making it easier for users to manage exploits, payloads, and sessions during penetration tests. This lab covers the process of performing port scanning & enumeration with Armitage.


Tasks

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo1.ine.local.

Objective: Enumerate the target machine and perform port scanning using Armitage.

Tools

  • Armitage

  • Metasploit Framework

Solution

Step 1: Open the lab link to access the Kali GUI instance.

Content Image

Step 2: Check if the target machine is reachable.

Command:

Content Image

Step 3: Port scanning & enumeration with Armitage.

Before starting up Armitage, you will need to start the postgresql database service, this can be done by running the following command:

Commands:

Content Image

We can start up Armitage by running the following command:

Command:

After starting up Armitage, you will be prompted to connect to the MSF database as shown in the following screenshot.

Content Image

Click on "Yes."

Content Image

Note: Armitage might take around 1 minute to get fully loaded.

After connecting to the MSF database, Armitage will open up as shown in the following screenshot.

Content Image

We can get started by adding the IP address/domain name of the target machine; this can be done by clicking on Hosts on the toolbar and on Add Hosts in the sub-menu, as shown in the following screenshot.

Content Image

You will then be prompted to add the host address of the target system as shown in the following screenshot.

Enter "demo1.ine.local" and click on "Add."

Content Image

After adding the target machine's address, the system will be added to the top panel.

We can perform a port scan on the target system by right-clicking on the system and clicking on Scan as shown in the following screenshot.

Content Image

This will begin the port scan on the target system, after which the results will be displayed in the bottom output pane as shown in the following screenshot.

Content Image

We can also perform an Nmap port scan on the target system by clicking on the hosts menu in the toolbar and the Nmap Scan option in the submenu as shown in the following screenshot.

Content Image

You will then be prompted to add the target machine's address as shown in the following screenshot.

Enter "demo1.ine.local" and click on "OK."

Content Image

This will begin the Nmap port scan; wait for the scan to get completed.

Content Image

After which, the results will be displayed in the output pane at the bottom as shown in the following screenshot.

Content Image

You can now view the open ports and services running on the target system by right-clicking on the system and clicking on services as shown in the following screenshot.

Content Image

As shown in the following screenshot, this will display the list of open ports and services discovered during the port scan.

Content Image

Conclusion

In this lab, we explored the process of performing port scanning and enumeration with Armitage.

Last updated