tag:blogger.com,1999:blog-8927794127513218467.post7313617545406155020..comments2023-05-26T18:26:32.709+02:00Comments on Code Bazaar: Introduction to Metasploit and ArmitageMatt Buchnerhttp://www.blogger.com/profile/03993705703169676412noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-8927794127513218467.post-64410148306691265412012-03-06T14:54:44.838+01:002012-03-06T14:54:44.838+01:00wow.. very interesting with virtual metasploit.. i...wow.. very interesting with virtual metasploit.. i will try it.. thanks bro. =) keep it up.Qasdihttps://www.blogger.com/profile/02218613743413133650noreply@blogger.comtag:blogger.com,1999:blog-8927794127513218467.post-58124753676655037222012-01-28T15:29:43.936+01:002012-01-28T15:29:43.936+01:00@Mathias,
I put J in URIPATH just to put something...@Mathias,<br />I put J in URIPATH just to put something. It could be anything. By default, the value is random.<br />Not all exploit give full control on the target, this is why you may not be able to use all the modules.Matt Buchnerhttps://www.blogger.com/profile/03993705703169676412noreply@blogger.comtag:blogger.com,1999:blog-8927794127513218467.post-84683866157802371742012-01-22T00:08:36.715+01:002012-01-22T00:08:36.715+01:00hey Matthias.
super cool tutorial!
A friend and i...hey Matthias.<br /><br />super cool tutorial!<br />A friend and i have been playing around with it now, and got stuff working. <br /><br />But we are wondering why you puts the "J" in the path from the Java modul at the end? <br /><br />And when we do that, it works, and without it i doesn't. <br /><br />Also, when we are in, why can we use stuff like the "key logger" or any other moduls ?<br /><br />Thanks.<br />Mathias.Mathiashttp://mangix.comnoreply@blogger.comtag:blogger.com,1999:blog-8927794127513218467.post-29531260196607637772011-10-02T16:51:08.356+02:002011-10-02T16:51:08.356+02:00Thanksbut i found the problem, i have installed me...Thanksbut i found the problem, i have installed metasploit mini.Wheni changed to Mteasploit full verything worksAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-8927794127513218467.post-65184580877311016852011-09-11T01:36:53.947+02:002011-09-11T01:36:53.947+02:00@xkazolx,
The Armitage installer provides everyth...@xkazolx, <br />The Armitage installer provides everything you need. You don't need to install Postgres separately. Also, I used all the default settings. If you share more details about the error you are getting, I might be able to help you.Matt Buchnerhttps://www.blogger.com/profile/03993705703169676412noreply@blogger.comtag:blogger.com,1999:blog-8927794127513218467.post-1505326751372543402011-09-02T17:13:31.849+02:002011-09-02T17:13:31.849+02:00i know i need postgres to create a connection for ...i know i need postgres to create a connection for armitage but i don't know how to do it on windows..Can you tell me the settings you used in postgres ?xkazolxhttps://www.blogger.com/profile/10654358791589251214noreply@blogger.comtag:blogger.com,1999:blog-8927794127513218467.post-45252460532796025072011-08-18T01:37:31.463+02:002011-08-18T01:37:31.463+02:00@IcebergDelphi
1. Yes, "Find Attacks" wi...@IcebergDelphi<br />1. Yes, "Find Attacks" will try to find the specified vulnerability on the target, but there is no guarantee of success, unless you are using Metasploitable. With "Hail Mary", Armitage will try all known vulnerabilities. <br /><br />2. If you find several exploitable vulnerabilities, read about them to understand which one gives you the higher level of control on the target and which one is the easiest to exploit.<br /><br />3. The IP I am opening in the web browser at the end of the video is the IP of the server hosting the malicious Java applet. In this case, it is actually hosted by Armitage/Metasploit.<br /><br />Have fun and be safe!<br />MatthiasMatt Buchnerhttps://www.blogger.com/profile/03993705703169676412noreply@blogger.comtag:blogger.com,1999:blog-8927794127513218467.post-48842861552981110882011-08-18T01:21:23.833+02:002011-08-18T01:21:23.833+02:00Hi perfect video, i'm new with this tool, but ...Hi perfect video, i'm new with this tool, but there is something i could not understand yet, example:<br />i'm runing Backtrack and Armitage in:192.162.1.1<br />so, if i did a scan, i found one Os windows victim with:192.168.1.2, then i have to choice my victim and run find attack, so my question are: 1.-With (find attack) armitage gonna find vulnerable holes?<br />2.-So when i gonna know what is the perfect exploit to attack the victim machine?<br />and 3.- i saw in you video, that you open a Internet browser with an IP, what does it means the IP?<br /><br />Thanks, greetings from Chiapas,Mexico.IcebergDelphihttps://www.blogger.com/profile/03593896957439477267noreply@blogger.com