Eh Lab 9
Eh Lab 9
Yarmouk University
Faculty of IT
Lab #9
Lab objectives:
we will use the Armitage tool to gain access to the remote target machine.
Requisites
Windows 10 / 7 machine.
Armitage https://www.kali.org/tools/armitage/
Lab Scenario:
Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits,
and exposes the advanced post-exploitation features in the framework. Using this tool, you can create sessions,
share hosts, capture data, downloaded files, communicate through a shared event log, and run bots to automate
pen testing tasks.
Lab tasks:
Note :: In this task, we will use the Kali (10.10.10.1) machine as the host system and the Windows 10
(10.10.10.10) machine as the target system. Please Review your ip configurations
2- Click Applications in the top-left corner of Desktop and navigate to Exploitation Tools -->
Metasploit Framework --> armitage to launch the Armitage tool.
3- The Connect… pop-up appears; leave the settings to default and click the Connect button.
6- Click on Hosts from the Menu bar and navigate to Nmap Scan --> Intense Scan to scan for live
hosts in the network.
7- The Input pop-up appears. Type a target IP address (here, 10.10.10.10) and click OK.
8- Observe that the target host (10.10.10.10) appears on the screen, as shown in the screenshot.
9- Now, from the left-hand pane, expand the payload node, and then navigate to windows -->
meterpreter; double-click meterpreter_reverse_tcp.
10- The windows/meterpreter_reverse_tcp window appears. Scroll down to the LPORT Option, and
change the port Value to 444. In the Output field, select exe from the drop-down options; click
Launch.
11- The Save window appears. Select Desktop as the location, set the File Name as
malicious_payload.exe, and click the Save button. ( you can set any name.exe)
15- switch to the Windows 10 machine and open any web browser (here, Mozilla Firefox). In the
address bar place your mouse cursor, click http://10.10.10.13/share and press Enter. As soon as
you press enter, it will display the shared folder contents, as shown in the screenshot.
16 - Click malicious_payload.exe to download the file. Open File - Security Warning window
appears; click Run.
16- switch to the Parrot Security machine. Observe that one session has been created or opened in the
Meterpreter shell, as shown in the screenshot, and the host icon displays the target system name
(WINDOWS10). ( it may vary depends on your machine )
17- Right-click on the target host and navigate to Meterpreter 1 --> Interact --> Meterpreter Shell.
18- A new Meterpreter 1 tab appears. Type sysinfo and press Enter to view the system details of
the exploited system, as shown in the screenshot.
19- Right-click on the target host and navigate to Meterpreter 1 --> Explore --> Browse Files.
20- A new Files 1 tab and the present working directory of the target system appear. You can observe
the files present in the Download folder of the target system.
Using this option, you can perform various functions such as uploading a file, making a
directory, and listing all drives present in the target system.
21- Right-click on the target host and navigate to Meterpreter 1 --> Explore --> Screenshot
22 - A new Screenshot 1 tab appears, displaying the currently open windows in the target system.
Similarly, you can explore other options such as Desktop (VNC), Show Processes, Log Keystrokes,
and Webcam Shot.
You can also escalate privileges in the target system using the Escalate Privileges option and
further steal tokens, dump hashes, or perform other activities.