Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit.

Similar presentations


Presentation on theme: "© 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit."— Presentation transcript:

1 © 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit

2 Overview What is Armitage? User Interface Reconnaissance and Host Management Attack Post-Exploitation Maneuver Reporting

3 What is Armitage? User interface for Metasploit –Red Team collaboration –Advanced Post-exploitation –Time Saving Automation Fast moving: 30+ Updates in 2011 Distributed with Metasploit –BackTrack Linux Recommended

4 User Interface Visualize targets Find the right module Work on multiple things

5 User Interface

6 Reconnaissance Launch NMap –db_nmap –Hosts -> NMap Scans Not pivot friendly!

7 Reconnaissance MSF Scans –Launches 20+ Metasploit Auxiliary Modules –Works through a pivot

8 Import Hosts –Acunetix –Amap –Appscan –Burp Session –Foundstone –IP360 –Microsoft Baseline Security Analyzer –Nessus –NetSparker –NeXpose –Nmap –OpenVA –Qualys –Retina Reconnaissance

9 Host Management Table View –Displays hundreds of hosts –Same information as graph view

10 Host Management For large networks, use dynamic workspaces Group hosts by: –Network –Open services –Operating system –Session status Use Workspaces menu to switch

11 Attack: Remote Exploits Search for exploits –Use module browser Exploit recommendations –Attacks -> Find Attacks “Hail Mary” –Smarter db_autopwn

12 Attack: Remote Exploits

13 Attack: Client-side Search for module Optional: configure payload Launch module

14 Attack: Client-side Search for module Optional: configure payload Launch module

15 Attack: Client-side Search for module Optional: configure payload Launch module

16 Attack: Client-side Search for module Optional: configure payload Launch module

17 Post Exploitation Spy on the user –Screenshots, webcam, key logging Access the file system –Upload, download, TIMESTOMP Escalate your privileges –Token stealing, local exploits

18 Post Exploitation

19 Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans

20 Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans

21 Maneuver Host Discovery: ARP Scan Pivoting Setup Metasploit Scans

22 Maneuver: Pass the Hash Use password hashes to authenticate as a user Requires an Active Directory domain

23 Maneuver: Pass the Hash Use password hashes to authenticate as a user Requires an Active Directory domain

24 Reporting Activity Logs –All console tabs logged –Organized by host/date Export Data –TSV and XML output of most data Quick Screenshot –Grab a screenshot of any tab

25 Summary What is Armitage? User Interface Reconnaissance and Host Management Attack Post-Exploitation Maneuver Reporting

26 Where to next? Armitage Homepage –http://www.fastandeasyhacking.com/http://www.fastandeasyhacking.com/ Twitter –@armitagehacker


Download ppt "© 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit."

Similar presentations


Ads by Google