![]() |
Hacking PC With Armitage - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: Hacking (https://sinister.ly/Forum-Hacking) +--- Forum: Tutorials (https://sinister.ly/Forum-Tutorials) +--- Thread: Hacking PC With Armitage (/Thread-Hacking-PC-With-Armitage) |
Hacking PC With Armitage - Nullerset - 06-01-2013 Hello, here is Nullerset, for beginning, i wanna say that i am Native Russian, so sorry me if my english is not perfect So Let`s start Open Armitage and click "Connect". And Now wait... ( I use armitage in Kali Linux, he is not same with BackTrack`s versions, but it`s not important ) When Open it click "Hosts > Msf Scans > Place the range of scanning IP`s ( or just one IP ); Ranges you can find out there: http://ipdiapazon.16mb.com/ ( It`s on Russian, sorry, but this is the best resource with IP Ranges, every range it`s own range for provider of internet connection ) Okey, now we are scanning the network. Note: MSF Scan understands ranges 192.168.0.0-192.168.255.255 and 192.168.0.0/24, but nmap understands just 192.168.0.0/24 Warning!! Do not scan very big networks, if you have already started scanning - you will not be able to cancle it, even if you close the window. I thinked that i canceled scanning, but after that when i get back i had a lot of computers, becouse of my armitage stoped work :| Ok, and now when we scanned all IP`s, let`s hack it After it MSF Scans will try to detect OS, if it not detect then try to Hosts > Nmap Scan > Quick Scan ( OS Detect ) Ok, now click Attacks > Find Attacks and Armitage will get all exploit`s wich can exploit the target open ports ( But it shouldn`t be vulnerability to all hosts ) If ports are open, you will see in the meny that opened by clicking "right mouse buttown" "Attacks > [type of exploit] > [Name of exploit] " Now list this down and you will see "Check Exploits", not all exploits get you opportunity to check them ![]() But if exploit support`s check you will see in the list ( down of Armitage ) the progress of chegking. If target is vulnerability to some exploit you will see the text "The target is Vulnerability" it`s good! And you`re got some chances to compromise the target ![]() Good, now do not forget the name of exploit and let`s try to exploit. Click "Right button mouse" on host > Attacks > Exploits and click on name of exploit You will see the menu with settings of exploit. We are Interested in LHOST - Your IP LPORT - Your Open Port RHOST - Remote Target IP RPORT - Remote Target Port Ok, Click Launch and if victim really vulnerability then arround of host you will see red animation ![]() There you see that i saw when hacked my LAN computer : So click Rigth Button on Mouse and you will see menu with name "Meterpreter". In this menu you will see the functions like as RAT So, you hacked computer by IP! ![]() Writed by Nu11ers3t From Moscow ![]() |