Armitage and Metasploit for Penetration Testing

Penetration Testing
     
Armitage: 
Metasploit GUI and Machine-Gun
Style Attack
CIS 6395, Incident Response Technologies
Fall 2021, Dr. Cliff Zou
czou@cs.ucf.edu
Acknowledgement
Some contents are from the book:
 
The Basics of Hacking and Penetration Testing:
Ethical Hacking and Penetration Testing Made Easy”,
Second Edition
undefined
Metasploit Attack Style and Limitation
From what we learnt so far, we know that Metasploit has the
following features
:
You need to know what vulnerability to exploit to use metasploit
(attack after scanning/gathering stage)
It is a pin-point attack to a specific target (like a sniper style attack)
It is command-line based attack
Advantages:
Stealthy: little attack traffic generated
Enable stepping stone attack initiated from multiple compromised
hosts
Disadvantages:
Need to know vulnerability beforehand
Command line operation requires experiences
undefined
Armitage: User-friendly Attacking Tool
Pre-installed in Kali Linux
GUI front-end for metasploit for easy to use
Machine-gun style metasploit attack
No need to specify a detected vulnerability in target
After specifying a target, Armitage will:
Conduct port scanning to the target
Throw all known exploit modules to the target based on scanning
results!
Attacker can relax and wait for successful
compromise
Disadvantages:
Noisy attack, easy to be detected
Hard to do stepping stone style attack
undefined
Armitage: Installing in New Kali Linux VM
Kali Linux 2020.3 and later versions do not have
Armitage pre-installed
You cannot use ‘apt-get install Armitage’ to install it
The two steps to install Armitage:
root@kali# apt update
root@kali#  apt install armitage
undefined
Starting Armitage in Kali Linux
Click “Connect” when a pop-up window shows
Select “Yes” when asking to start metasploit RPC server
undefined
Starting Armitage in Kali Linux
If the following Message shows up, you need to run ‘msfdb
init’ and then start the SQL service by “service postgresql
start’
undefined
Use Armitage to Attack Vulnerable VMs
Network scenario (all VMs runs in ‘NAT network’ or ‘Bridged Adaptor’
network mode under the same virtual NAT in virtualBox):
Kali Linux attack VM:  10.0.2.5
Vulnerable WinXP VM: 10.0.2.6
Metasploitable Linux VM: 10.0.2.7
undefined
Use Armitage to Attack Vulnerable VMs
First, scan local subnet to find local targets
 
Select menu “Hosts”
 “Nmap Scan” 
 “Quick Scan (OS Detect)”
Let it scan 10.0.2.0/24 subnet
The 2 target VMs will show up with their OS information
You can remove uninterested target from the target list to reduce attack
noise
undefined
Use Armitage to Attack Vulnerable VMs
Then, build attack module lists
 
Select menu “Attacks”
 “Find Attacks”
Only scannerble vulnerabilities found, not those ‘Drive-by Download’ browser bugs
Will not generate network traffic, it only query and search in the metasploit database
All possible attacks are added to each target machine
undefined
Two Bugs 
when Use Armitage to Attack Vulnerable
VMs
IF, the previous ‘Find Attacks’ does not work:
 
Select menu ‘Armitage’ 
 ‘Set Exploit Rank’ 
 ‘Poor’
The default rank of ‘Good’ seems to prevent attack analysis (a bug in code?)
However, the ‘Find Attacks’ may stuck at one specific
metasploit attack module….
Appear to be a bug
in current Armitage
Solution:
Find this attack module and delete it!
# locate saltstack_salt_unauth_rce
Use ‘rm’ command to delete these two files
Now everything works!
undefined
Use Armitage to Attack Vulnerable VMs
Individual target attack
 
Select a target, right click to show pop-up menu
You can choose one available attack module to attack
The figure shows possible attack to SMB on the vulnerable WinXP
undefined
Use Armitage to Attack Vulnerable VMs
Successful Exploit
 
When selecting MS08-067_netapi bug, the vulnerable 
WinXP is
successfully compromised
The WinXP becomes outlined in red lightning bolts! Yay!
undefined
Use Armitage to Attack Vulnerable VMs
Now you can choose any available payloads
 
Right click the compromised target, you can see available payload
In this example, Meterpreter session is enabled
undefined
Use Armitage to Attack Vulnerable VMs
Easiest way: Hail Mary flooding attack
 
Click menu “Attacks”
 “Hail Mary”
Armitage will throw all available attacks to all targets
Very noisy, lots of attack traffic!!!
Both WinXP and Metasploitable VMs are compromised, 6 attack
sessions have been created!
undefined
Summary of Armitage
Pros:
Easy to use and deploy
Combine scanning and exploiting together
Cons:
Could be very noisy
Cannot make some advanced configurations, such as stepping stone attack
Slide Note
Embed
Share

Explore the capabilities of Armitage and Metasploit in penetration testing, comparing their attack styles, advantages, and limitations. Learn how Armitage simplifies the process by providing a GUI front-end for Metasploit, making it user-friendly for conducting machine-gun style attacks. Discover the installation process of Armitage in Kali Linux and how to start using it effectively.

  • Penetration Testing
  • Armitage
  • Metasploit
  • Kali Linux
  • Cybersecurity

Uploaded on Sep 27, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2021, Dr. Cliff Zou czou@cs.ucf.edu

  2. Acknowledgement Some contents are from the book: The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy , Second Edition

  3. Metasploit Attack Style and Limitation From what we learnt so far, we know that Metasploit has the following features: You need to know what vulnerability to exploit to use metasploit (attack after scanning/gathering stage) It is a pin-point attack to a specific target (like a sniper style attack) It is command-line based attack Advantages: Stealthy: little attack traffic generated Enable stepping stone attack initiated from multiple compromised hosts Disadvantages: Need to know vulnerability beforehand Command line operation requires experiences

  4. Armitage: User-friendly Attacking Tool Pre-installed in Kali Linux GUI front-end for metasploit for easy to use Machine-gun style metasploit attack No need to specify a detected vulnerability in target After specifying a target, Armitage will: Conduct port scanning to the target Throw all known exploit modules to the target based on scanning results! Attacker can relax and wait for successful compromise Disadvantages: Noisy attack, easy to be detected Hard to do stepping stone style attack

  5. Armitage: Installing in New Kali Linux VM Kali Linux 2020.3 and later versions do not have Armitage pre-installed You cannot use apt-get install Armitage to install it The two steps to install Armitage: root@kali# apt update root@kali# apt install armitage

  6. Starting Armitage in Kali Linux Click Connect when a pop-up window shows Select Yes when asking to start metasploit RPC server

  7. Starting Armitage in Kali Linux If the following Message shows up, you need to run msfdb init and then start the SQL service by service postgresql start

  8. Use Armitage to Attack Vulnerable VMs Network scenario (all VMs runs in NAT network or Bridged Adaptor network mode under the same virtual NAT in virtualBox): Kali Linux attack VM: 10.0.2.5 Vulnerable WinXP VM: 10.0.2.6 Metasploitable Linux VM: 10.0.2.7

  9. Use Armitage to Attack Vulnerable VMs First, scan local subnet to find local targets Select menu Hosts Nmap Scan Quick Scan (OS Detect) Let it scan 10.0.2.0/24 subnet The 2 target VMs will show up with their OS information You can remove uninterested target from the target list to reduce attack noise

  10. Use Armitage to Attack Vulnerable VMs Then, build attack module lists Select menu Attacks Find Attacks Only scannerble vulnerabilities found, not those Drive-by Download browser bugs Will not generate network traffic, it only query and search in the metasploit database All possible attacks are added to each target machine

  11. Two Bugs when Use Armitage to Attack Vulnerable VMs IF, the previous Find Attacks does not work: Select menu Armitage Set Exploit Rank Poor The default rank of Good seems to prevent attack analysis (a bug in code?) However, the Find Attacks may stuck at one specific metasploit attack module . Appear to be a bug in current Armitage Solution: Find this attack module and delete it! # locate saltstack_salt_unauth_rce Use rm command to delete these two files Now everything works!

  12. Use Armitage to Attack Vulnerable VMs Individual target attack Select a target, right click to show pop-up menu You can choose one available attack module to attack The figure shows possible attack to SMB on the vulnerable WinXP

  13. Use Armitage to Attack Vulnerable VMs Successful Exploit When selecting MS08-067_netapi bug, the vulnerable WinXP is successfully compromised The WinXP becomes outlined in red lightning bolts! Yay!

  14. Use Armitage to Attack Vulnerable VMs Now you can choose any available payloads Right click the compromised target, you can see available payload In this example, Meterpreter session is enabled

  15. Use Armitage to Attack Vulnerable VMs Easiest way: Hail Mary flooding attack Click menu Attacks Hail Mary Armitage will throw all available attacks to all targets Very noisy, lots of attack traffic!!! Both WinXP and Metasploitable VMs are compromised, 6 attack sessions have been created!

  16. Summary of Armitage Pros: Easy to use and deploy Combine scanning and exploiting together Cons: Could be very noisy Cannot make some advanced configurations, such as stepping stone attack

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#