See how to use the Armitage attack tool to pivot/tunnel into a network in this video.
- [Instructor] The Armitage tool in Kali provides a means…of gaining access to internal network targets…by doing a pivot.…This requires an exploited host.…And to achieve this, I'll create an MSF Venom payload…for my Windows 7 target system.…This needs to be a Windows meterpreter reverse tcp payload…in exe format pointing back to my Kali host.…I won't include any encoding…and I'll set the reverse connection port as 2222.…
That's complete.…I've already copied this into my Windows system…as if it were a malicious payload sent by an attacker.…On my Armitage screen, I'll add the Windows 7 host…on 10.0.2.6.…In Armitage at the left I'll select payload, Windows,…meterpreter, reverse tcp.…
And I'll remove the encoding.…And I'll change the port to 2222.…We're now waiting for one of our victims…to click on the malicious attachment.…Let's be a willing victim and do that.…I have the winjan executable in the tools folder…so I'll execute it.…
The trojan in Windows 7 has detected the server…and connected and Armitage has exploited it.…
- How tunneling works
- Running a local SSH tunnel
- Dynamic SSH tunneling
- Pivoting with Armitage and Metaspoit
- Exfiltrating using DET and DNS
- Covert exfiltration with Cachetalk
- Using PyExfil to exfiltrate over HTTPS
Skill Level Advanced
Ethical Hacking: Penetration Testingwith Lisa Bock1h 29m Intermediate
Penetration Testing Essential Trainingwith Malcolm Shore2h 29m Intermediate
Penetration Testing: Advanced Kali Linuxwith Malcolm Shore2h 22m Intermediate
1. Preparing the Lab
Next steps1m 38s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.