Latest News

Hack Windows XP using Armitage Kali Linux

Intro - In this tutorial we will learn How to use armitage for hacking windows XP as well as we will learn using of Meterpreter. I will Explain you simple and easiest way to run armitage in Kali Linux. I noticed one thing while starting armitage by going Application → kali linux → Exploitation Tools → Network Exploitation → armitage . There i got an error "Could not connect to database." If you are using first time Armitage on Kali linux then there are two way to run successfully armitage on your system. I will explain both separately.

A. How to open armitage. 
      1. Go to application → System Service → Metasploit → community/pro start
                                                                             (click image for large view)

      2. Type armitage and hit enter

B. How to open armitage
     1. Open terminal and type service postgresql start

     2. again type in terminal service metasploit start

     3. now type armitage

After one of above method follow these
4. after some time you will see this screen just click on connect 

5. In next screen click on Yes

6. now armitage is connecting to database it takes little bit time 

7. Your armitage has been successfully opened more explaination on image 

8. Now be ready to start your work Here we are going Host Nmap scan Quick scan (OS Detect)

9. Here we need to write a range of victim IP address I am putting C grade range of IP so armitage will detect victim IP. This scan will be more easy if you know the victim IP address. There are many way to know the victim IP address we will discuss about it later.  

10.  Scan completed just click ok 

11. Here we can see. Armitage found two victim. Here we will discuss about
Now we are going to Attacks Find Attacks

12. Find attack scan completed click on ok 

13. Now right click on victim pc go to Attack smb ms08_067_netapi

14. check “use a reverse connection” and click on launch 

15. Here we can see is rounded by red color. It means we have successfully caught Victim PC.

16. Now we are starting meterpreter. This is the 1st action which we can do with victim pc. Right click on victim go to Meterpreter → Interact→ Command Shell

17. Here we are enter on Victim PC command. I will not explain more things about cmd as you know in cmd we can see all the directory and files, we can delete, remove, create files or folder , we can format drive etc…

18. 2nd action with Meterpreter. Goto Meterpreter → Explore → Browse Files

19. Here we are enter in victim explorer. We can upload a file or virus or backdoor. Use your mind and do whatever you want to do with your victim…

20. 3rd action with Meterpreter. Go to Meterpreter → Explore → Screenshot

21. when you click on screenshot (above image). You will see a screenshot of your victim pc. Through this you can get lot of information like what your victim is doing right now on his PC etc..

22. 4th action with Meterpreter. Go to Meterpreter → Explore → Log Keystrokes

23. click on launch

24. This is my Windows XP PC which I am using as victim PC. Here I am typing “I am victim” to show you how Log keystrokes work .

25. Here you can see here I got keystroke of my victim pc that is “I am victim”

26.  5th action with meterpreter. Go to Meterpreter Explore Show Processes

27. This is victim pc. he has opened notepad.

28. Here we are killing victim notepad. First of all select notepad extention then click on kill. By using this you can kill all programs which are running on victim pc etc…
(click image for large view)
if you like my tutorials please comment

Like it ? Share it.

No comments:

Post a Comment

Contact Us

24x7 online , we happy to answer you , ,
skype: greeenchip


This Blog and its TUT's are intended for educational purposes only, no-one involved in the creation of this TuT may be held responsible for any illegal acts brought about by this Blog or TuT.

Featured Post

Custom Domains And HTTPS Redirection Code