Hacking PC With Armitage 06-01-2013, 02:08 PM
#1
Hello, here is Nullerset, for beginning, i wanna say that i am Native Russian, so sorry me if my english is not perfect
So Let`s start
Open Armitage and click "Connect". And Now wait... ( I use armitage in Kali Linux, he is not same with BackTrack`s versions, but it`s not important )
When Open it click "Hosts > Msf Scans > Place the range of scanning IP`s ( or just one IP ); Ranges you can find out there: http://ipdiapazon.16mb.com/ ( It`s on Russian, sorry, but this is the best resource with IP Ranges, every range it`s own range for provider of internet connection )
Okey, now we are scanning the network.
Note: MSF Scan understands ranges 192.168.0.0-192.168.255.255 and 192.168.0.0/24, but nmap understands just 192.168.0.0/24
Warning!! Do not scan very big networks, if you have already started scanning - you will not be able to cancle it, even if you close the window.
I thinked that i canceled scanning, but after that when i get back i had a lot of computers, becouse of my armitage stoped work :|
Ok, and now when we scanned all IP`s, let`s hack it
After it MSF Scans will try to detect OS, if it not detect then try to Hosts > Nmap Scan > Quick Scan ( OS Detect )
Ok, now click Attacks > Find Attacks and Armitage will get all exploit`s wich can exploit the target open ports ( But it shouldn`t be vulnerability to all hosts )
If ports are open, you will see in the meny that opened by clicking "right mouse buttown" "Attacks > [type of exploit] > [Name of exploit] "
Now list this down and you will see "Check Exploits", not all exploits get you opportunity to check them
But if exploit support`s check you will see in the list ( down of Armitage ) the progress of chegking.
If target is vulnerability to some exploit you will see the text "The target is Vulnerability" it`s good! And you`re got some chances to compromise the target
Good, now do not forget the name of exploit and let`s try to exploit.
Click "Right button mouse" on host > Attacks > Exploits and click on name of exploit
You will see the menu with settings of exploit. We are Interested in
LHOST - Your IP
LPORT - Your Open Port
RHOST - Remote Target IP
RPORT - Remote Target Port
Ok, Click Launch and if victim really vulnerability then arround of host you will see red animation
![[Image: FA1jisZeChE.jpg]](http://cs412531.vk.me/v412531821/479/FA1jisZeChE.jpg)
There you see that i saw when hacked my LAN computer :
So click Rigth Button on Mouse and you will see menu with name "Meterpreter". In this menu you will see the functions like as RAT
So, you hacked computer by IP!
Writed by Nu11ers3t
From Moscow
So Let`s start
Open Armitage and click "Connect". And Now wait... ( I use armitage in Kali Linux, he is not same with BackTrack`s versions, but it`s not important )
When Open it click "Hosts > Msf Scans > Place the range of scanning IP`s ( or just one IP ); Ranges you can find out there: http://ipdiapazon.16mb.com/ ( It`s on Russian, sorry, but this is the best resource with IP Ranges, every range it`s own range for provider of internet connection )
Okey, now we are scanning the network.
Note: MSF Scan understands ranges 192.168.0.0-192.168.255.255 and 192.168.0.0/24, but nmap understands just 192.168.0.0/24
Warning!! Do not scan very big networks, if you have already started scanning - you will not be able to cancle it, even if you close the window.
I thinked that i canceled scanning, but after that when i get back i had a lot of computers, becouse of my armitage stoped work :|
Ok, and now when we scanned all IP`s, let`s hack it
After it MSF Scans will try to detect OS, if it not detect then try to Hosts > Nmap Scan > Quick Scan ( OS Detect )
Ok, now click Attacks > Find Attacks and Armitage will get all exploit`s wich can exploit the target open ports ( But it shouldn`t be vulnerability to all hosts )
If ports are open, you will see in the meny that opened by clicking "right mouse buttown" "Attacks > [type of exploit] > [Name of exploit] "
Now list this down and you will see "Check Exploits", not all exploits get you opportunity to check them

But if exploit support`s check you will see in the list ( down of Armitage ) the progress of chegking.
If target is vulnerability to some exploit you will see the text "The target is Vulnerability" it`s good! And you`re got some chances to compromise the target

Good, now do not forget the name of exploit and let`s try to exploit.
Click "Right button mouse" on host > Attacks > Exploits and click on name of exploit
You will see the menu with settings of exploit. We are Interested in
LHOST - Your IP
LPORT - Your Open Port
RHOST - Remote Target IP
RPORT - Remote Target Port
Ok, Click Launch and if victim really vulnerability then arround of host you will see red animation
![[Image: FA1jisZeChE.jpg]](http://cs412531.vk.me/v412531821/479/FA1jisZeChE.jpg)
There you see that i saw when hacked my LAN computer :
So click Rigth Button on Mouse and you will see menu with name "Meterpreter". In this menu you will see the functions like as RAT
So, you hacked computer by IP!

Writed by Nu11ers3t
From Moscow
