Welcome back, my dear white hat hackers!
As you well know, so far, Metasploit is one of my favorite hacking software. It can enter codes into a system and control it. On top of that, it can be integrated into the vulnerability scanner, Nexpose. Many beginners may feel uncomfortable using msfconsole, and this is most likely because they have not allocated enough time to the software. However, Metasploit also has other means of control, which make the operation of the systems much easier, for those who do not have enough experience with the terminal. For those who feel more at ease when using a graphical interface, Raphael Mudge has developed such an interface. It’s called Armitage, which we talked about in the first guide. For novice hackers, Armitage helps them learn Metasploit much faster. Let’s take a look at this graphical interface for Metasploit.
Step 1: We open Kali and start Metasploit
The first thing we need to do is make sure the PostgreSQL server is up and running. In the terminal we write the command:
service postgresql start
Now we start Metasploit by the following command:
Step 2: Let’s start Armitage
Armitage uses a client/server architecture, where Metasploit is the server and Armitage is the client. Armitage is a GUI client with which we can interact and control the Metasploit server.
We start Armitage in Kali by clicking on the icon on the left or typing the command armitage in the terminal.
We will see the following screen:
If we run Metasploit from our system, we leave the default settings and click on Connect. If we want to run Armitage from another system, we simply enter the ip of the system running Metasploit.
Step 3: Starting the RPC server
Armitage connects to the RPC server to control Metasploit. We will see the following screen after starting Armitage:
In some cases, it will take some time to connect, as in the screen below:
When Armitage connects to the Metasploit RPC server, we will be greeted by the following screen:
Congratulations! You run Metasploit using a GUI.
Step 4: Exploring Armitage
We notice that in the upper left corner, we can see folders. These folders contain four types of Metasploit modules.
If you’ve read my first three guides to Metasploit, you already know how Metasploit organizes modules. For starters, exploits and payloads are the most important.
We can expand the modules in a directory, just by simply clicking on the arrow next to them.
We notice that exploits are categorized according to the operating system for which they are designed, such as Windows, BSD, Linux, Solaris, etc. Remember! Exploits are specific to operating systems, applications, ports, services, etc. If we click on the windows subdirectory and expand it, we can see all the exploits for this operating system, classified by type.
Now, when we look for an exploit to use on a certain system with a certain vulnerability, all we have to do is click to find it:
Step 5: Hail Mary!
Almost everything you can do with the Metasploit console, you can do with Armitage. However, there is something that can be done with Armitage, but not with msfconsole (at least not without scripting), namely Hail Mary. Hail Mary is when Armitage simply throws every exploit against a site to see which one works.
We go to “Attacks” and select “Hail Mary”. When we click on it, we receive the following warning:
It is not very effective for hacking, since the attack is not undetectable. It will cause so much “noise” on the target that it will immediately detect the attack, but in a virtual laboratory dedicated to pen testing, it can be very useful to try numerous attacks on a target, to see which one works.
Armitage offers the aspiring hacker to quickly understand the basics of hacking with the help of Metasploit and to convince him to use this powerful and excellent software.
That’s about it for now. Make sure you come back for other equally interesting tutorials.