32

Intro - In this tutorial we will learn How to use armitage for hacking windows XP as well as we will learn using of Meterpreter. I will Explain you simple and easiest way to run armitage in Kali Linux. I noticed one thing while starting armitage by going Application → kali linux → Exploitation Tools → Network Exploitation → armitage . There i got an error "Could not connect to database." If you are using first time Armitage on Kali linux then there are two way to run successfully armitage on your system. I will explain both separately.




A. How to open armitage. 
      1. Go to application → System Service → Metasploit → community/pro start
                                                                             (click image for large view)

      2. Type armitage and hit enter

B. How to open armitage
     1. Open terminal and type service postgresql start

     2. again type in terminal service metasploit start

     3. now type armitage

After one of above method follow these
4. after some time you will see this screen just click on connect 

5. In next screen click on Yes

6. now armitage is connecting to database it takes little bit time 

7. Your armitage has been successfully opened more explaination on image 

8. Now be ready to start your work Here we are going Host Nmap scan Quick scan (OS Detect)

9. Here we need to write a range of victim IP address I am putting C grade range of IP so armitage will detect victim IP. This scan will be more easy if you know the victim IP address. There are many way to know the victim IP address we will discuss about it later.  

10.  Scan completed just click ok 

11. Here we can see. Armitage found two victim. Here we will discuss about 192.168.75.131
Now we are going to Attacks Find Attacks

12. Find attack scan completed click on ok 

13. Now right click on victim pc go to Attack smb ms08_067_netapi

14. check “use a reverse connection” and click on launch 

15. Here we can see 192.168.75.131 is rounded by red color. It means we have successfully caught Victim PC.

16. Now we are starting meterpreter. This is the 1st action which we can do with victim pc. Right click on victim 192.168.75.131 go to Meterpreter → Interact→ Command Shell

17. Here we are enter on Victim PC command. I will not explain more things about cmd as you know in cmd we can see all the directory and files, we can delete, remove, create files or folder , we can format drive etc…

18. 2nd action with Meterpreter. Goto Meterpreter → Explore → Browse Files

19. Here we are enter in victim explorer. We can upload a file or virus or backdoor. Use your mind and do whatever you want to do with your victim…

20. 3rd action with Meterpreter. Go to Meterpreter → Explore → Screenshot

21. when you click on screenshot (above image). You will see a screenshot of your victim pc. Through this you can get lot of information like what your victim is doing right now on his PC etc..

22. 4th action with Meterpreter. Go to Meterpreter → Explore → Log Keystrokes

23. click on launch

24. This is my Windows XP PC which I am using as victim PC. Here I am typing “I am victim” to show you how Log keystrokes work .

25. Here you can see here I got keystroke of my victim pc that is “I am victim”

26.  5th action with meterpreter. Go to Meterpreter Explore Show Processes

27. This is victim pc. he has opened notepad.

28. Here we are killing victim notepad. First of all select notepad extention then click on kill. By using this you can kill all programs which are running on victim pc etc…
(click image for large view)
if you like my tutorials please comment



Like it ? Share it.

Post a Comment

  1. You actually make it seem so easy with your presentation but I
    find this matter to be actually something that I
    think I would never understand. It seems too complex and extremely broad for me.
    I am looking forward for your next post, I will try to get the hang
    of it!

    Also visit my blog; more details

    ReplyDelete
  2. Thanks Everyone for your valuable comments

    ReplyDelete
  3. Some really prime blog posts on this website ,
    saved to my bookmarks .

    Also visit my blog post: www.nanoevolution.pl

    ReplyDelete
  4. hey....It shows error what to do..??
    set up is alright and I have tried right exploits & payloads...
    help me please...!!

    ReplyDelete
    Replies
    1. Kindly mention your error what you are getting ?

      Delete
    2. Connection timed out::Exploit failed...!!

      Delete
    3. Check your internet connection

      Delete
  5. I tried many times but my victims pc haven't rounded by red color...!! help me please.. :(

    ReplyDelete
    Replies
    1. Your Victim PC's firewall should be turn off.

      Delete
    2. Is it possible to hack windows if firewall turn on..??

      Delete
    3. You can bypass it for 'how to bypass' You have to wait for my tutorial or google for it

      Delete
  6. how to hack window 7

    ReplyDelete
    Replies
    1. I will be post tutorial on this matter soon

      Delete
  7. can you please upload a video tutorial?

    ReplyDelete
    Replies
    1. yes sure but you have to wait anyways you should try it. It is well explained If you face any problem you can ask me via mail or comment

      Delete
  8. Whenever I did the OS sccan, Armitage popped up 2 windows which look like the one on right. I can't do anything with it. Is there a trick for it?

    ReplyDelete
    Replies
    1. There is firewall who is stopping you to do anything. I will advice you if you are doing first time, do it in your own network Lab. set up a small lab with VM. first test your self that you have understood the complete concept.

      Delete
  9. Can you please explain DNS spoofing & Sniffing and tell me what can we with these two tech.??

    ReplyDelete
    Replies
    1. within next week i will cover these two tools on my article so just wait sometime. and keep visiting thank you for your comment

      Delete
  10. whenever I tried this exploiting method. I have an error on victim's machine that is my windows XP Sp2 5.1 PC. error is in a dialogue box ie. Generic Host Process for win32 services has encountered a problem and needs to close.We are sorry for the inconvenience.

    Please Help me about it. And can you please hack my pc for an example for me using teamwear.

    ReplyDelete
    Replies
    1. First of let me tell you above method works on LAN and there is also WAN for both you need physical access.

      Delete
    2. will you please explain it using teamwear??

      Delete
    3. Go to Contact Us tab There is my mail id. about this we will discuss there

      Delete
  11. how much time it takes to trigger a vulneberity.???

    ReplyDelete
    Replies
    1. Not much. Guys again I am saying before attacking on your actual target. Learn to attack through your personal VM LAB.

      Delete
  12. thank :) victim has been hacked thank u again ! :)

    ReplyDelete
  13. Hi ,
    first of all very nice work ,Keep it up
    my question is that how can we hack via armitage out of lan i mean to say how hack any computer out of my modem server , i just scan the victim extarnal ip its show me victim pc but its dead and black window reply me im waiting for your reply if you make any tut abt my question give me the link
    Thanks

    ReplyDelete
    Replies
    1. So you want to Hack someone's PC which is not in your LAN. If he is not your LAN Victim then you have enter in his network for example if you want to hack your neighbour's PC (He is not in your LAN) and he use wifi or WAN then you have to hack first his wifi then attack on his PC.
      Sorry Right now we do not have any tutorial on WAN but we will publish it soon.
      Thanks for comment.

      Delete
  14. stops on (attempting to trigger the vulnerability...) firewall is off

    ReplyDelete
  15. download link for armitage plzz

    ReplyDelete

Comment Rules :
1. Do not post Adult/illegal Links.
2. Try to comment in only English Language.
3. Do not post other website's links which are useless.
4. Your Comment should be based on the Topic for other queries Kindly Visit our Contact Us Page.
5. Do not use Abusive Language.
6. Respect each other.
Thank You for following the rules. Please Comment....

 
Top