Armitage UI for Metasploit v04.10.11 Released
Armitage organizes Metasploit’s capabilities around the hacking process. There are features for discovery, access, post-exploitation, and manuver. This section describes these features at a high-level, the rest of this manual covers these capabilities in detail.
For discovery, Armitage exposes several of Metasploit’s host management features. You can import hosts and launch scans to populate a database of targets. Armitage also visualizes the database of targets–you’ll always know which hosts you’re working with and where you have sessions.
Armitage assists with remote exploitation–providing features to automatically recommend exploits and even run active checks so you know which exploits will work. If these options fail, you can use the Hail Mary approach and unleash db_autopwn against your target database.
For those of you who are hacking post-2003, Armitage exposes the client-side features of Metasploit. You can launch browser exploits, generate malicious files, and create Meterpreter executables.
Once you’re in, Armitage provides several post-exploitation tools built on the capabilities of the Meterpreter agent. With the click of a menu you will escalate your privileges, dump password hashes to a local credentials database, browse the file system like you’re local, and launch command shells.
Finally, Armitage aids the process of setting up pivots, a capability that lets you use compromised hosts as a platform for attacking other hosts and further investigating the target network. Armitage also exposes Metasploit’s SOCKS proxy module which allows external tools to take advantage of these pivots. With these tools, you can further explore and maneuver through the network.
- Fixed key logger dump button.
- Process migrate function displays success or fail message again.
- Armitage now displays nmap output in a tab. You can thank scriptjunkie for making this work in Metasploit. Please send cash, check, or money order directly to him.
- Greatly improved post-pivot host discovery workflow… here’s the deal:
- Added a rudimentary loot browser/viewer to Armitage. Go to View -> Loot to see the currently captured loots. Loot is the Metasploit term for data captured by certain post/ modules.
- Armitage now presents a warning when it detects a second Metasploit user connected to the same Metasploit server without the collaboration server in place.
- Armitage collaboration mode now updates target information more often
- Updated Armitage to work with Metasploit’s new normalized host OS constants and to restore the os_flavor value when it is wiped out.