Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Hacking PC With Armitage filter_list
Author
Message
Hacking PC With Armitage #1
Hello, here is Nullerset, for beginning, i wanna say that i am Native Russian, so sorry me if my english is not perfect

So Let`s start

Open Armitage and click "Connect". And Now wait... ( I use armitage in Kali Linux, he is not same with BackTrack`s versions, but it`s not important )

When Open it click "Hosts > Msf Scans > Place the range of scanning IP`s ( or just one IP ); Ranges you can find out there: http://ipdiapazon.16mb.com/ ( It`s on Russian, sorry, but this is the best resource with IP Ranges, every range it`s own range for provider of internet connection )

Okey, now we are scanning the network.

Note: MSF Scan understands ranges 192.168.0.0-192.168.255.255 and 192.168.0.0/24, but nmap understands just 192.168.0.0/24

Warning!! Do not scan very big networks, if you have already started scanning - you will not be able to cancle it, even if you close the window.

I thinked that i canceled scanning, but after that when i get back i had a lot of computers, becouse of my armitage stoped work :|


Ok, and now when we scanned all IP`s, let`s hack it

After it MSF Scans will try to detect OS, if it not detect then try to Hosts > Nmap Scan > Quick Scan ( OS Detect )

Ok, now click Attacks > Find Attacks and Armitage will get all exploit`s wich can exploit the target open ports ( But it shouldn`t be vulnerability to all hosts )

If ports are open, you will see in the meny that opened by clicking "right mouse buttown" "Attacks > [type of exploit] > [Name of exploit] "

Now list this down and you will see "Check Exploits", not all exploits get you opportunity to check them Biggrin

But if exploit support`s check you will see in the list ( down of Armitage ) the progress of chegking.

If target is vulnerability to some exploit you will see the text "The target is Vulnerability" it`s good! And you`re got some chances to compromise the target Smile

Good, now do not forget the name of exploit and let`s try to exploit.

Click "Right button mouse" on host > Attacks > Exploits and click on name of exploit

You will see the menu with settings of exploit. We are Interested in

LHOST - Your IP

LPORT - Your Open Port
RHOST - Remote Target IP
RPORT - Remote Target Port

Ok, Click Launch and if victim really vulnerability then arround of host you will see red animation


[Image: FA1jisZeChE.jpg]

There you see that i saw when hacked my LAN computer :

So click Rigth Button on Mouse and you will see menu with name "Meterpreter". In this menu you will see the functions like as RAT

So, you hacked computer by IP! Smile


Writed by Nu11ers3t
From Moscow Smile

Reply







Users browsing this thread: 1 Guest(s)