| Learn how to use Armitage in Backtrack 5 Posted: 11 Nov 2012 06:40 AM PST  
Introduction - Armitage is the GUI based tool for Metasploit , that shows the targets , exploits in the framework.
Features of Armitage - With Armitage you can scan all the alive host on the network .
- Armitage recommends exploits and will optionally run active checks to tell you which exploits will work.
- If these options fail, use the Hail Mary attack to unleash Armitage's smart automatic exploitation against your targets.
- When you successfully exploit the target , With the click of a menu you will escalate your privileges, log keystrokes, browse the file system, and use command shells.
Requirements - Latest Metasploit framework 4.3 or above
- Oracle Java 1.7
Step 1 : Open armitage on Backtrack 5. - Click on Backtrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > armitage
- See the below image for more details how to open armitage n Backtrack 5 r2.
Step 2 : Connect Armitage - Click on the connect Button .
- See the below image for more details -
Step 3 : Connecting Armitage - It takes few minutes to connect . So have some patience.
Step 4 : Armitage Window - Here is your armitage window shown below -
 - Armitage has 3 panels : -
- TARGET PANEL : It represents the computer ip address and other information .
- MODULE PANEL: It shows the auxiliary,exploit,payload and post.
- TABS PANEL : Armitage opens each dialog, console, and table in a tab below the module and target panels. Click the X button to close a tab
 Step 5 : Find the alive host on the Network - In this step we have to search for the host .
- Under the Nmap Scan, select the option > Quick Scan (OS detect)
- See the below image for more details .
- Here you have to enter the scan range .
- Here 192.168.222.0/24 this is class C range.
- Example image shown below -
- Your Scan is complete now .
- If the nmap scan find the alive host , then it will be shown on your Target Panel .(As shown Below )
- See the below image for more details -
Step 6 : Finding Attacks - Click on the Attacks > Find Attacks .
- It will find the most suitable attack for host shown in the Target Panel.
- See the image shown below -
- When attack analysis finished , it informs with a message shown in the image below -
Step 7 : Set the vulnerebility - Right click on the host
- Click on smb
- Select the ms08_067_netapi vulnerebility .
- Click on the checkbox - Use a reverse connection .
- Now click on the Launch Button .
Step 8 : - If the target host is vulnerable then its color changes to red .That means we can attack into the computer system.
  |
| Create A Run Command Posted: 11 Nov 2012 05:45 AM PST  
Today, I'm going to share a simple trick about Windows Run utility. Do you use ' Run ' in windows for opening your applications easily and fastly? Yes, you use it, if I am not wrong, because many of us use it, you put a already created command, hit enter and a the desired application opens. So, what you think? Want to create your own command? Ok, read on to find how to create one for your favorite applications. Actually, Run on Windows Operating System is something like a simple application that allows to open an application directly without navigating to its actual location and double-clicking on that executable file. Let's move on to Create a Run Command The process is very easily, just follow these simple steps carefully, - Open Run ( Navigate to Start Menu, then click on 'Run' )
- In the box type the following command- 'regedit', it will open the window's registry, it is a place where various configurations of the Operating System are stored. Please don't mess with Window Registry, if you don't know a lot about it.
- Then go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Apps Path
- In the Apps Path, you will see a huge list of executable(.exe) files like this:
- So, after that right click on Apps Path, then New, choose 'Key'
- Give it a name like hacker.exe or anything that feels good to you.
- Right Click the (Default) under Name, and click on Modify
- Change the 'Value data' to the path of the .exe file which you are going to run, like 'C:\Program Files\Internet Explorer\IEXPLORE.EXE'
- Now Create a new String Value by just Right-Clicking, then 'New', choose 'String Value', named it 'Path', after then, open it, and paste the same link which you have put in the 'Value Data' of (Default) String, i.e, 'C:\Program Files\Internet Explorer\IEXPLORE.EXE'. You will see something like this.
- Now, all is done, you just have to open 'Run' once again and type the name of your command i.e, hacker.exe and the appointed application will open.
It's very easy to do, you can create many personal 'Run' command using this and use it, comment if you get any type of error or else.  |
Niciun comentariu:
Trimiteți un comentariu