Armitage (software)

from Wikipedia, the free encyclopedia
Armitage

Screenshot
Screenshot by Armitage
Basic data

Maintainer Leo Louvre
developer Raphael Mudge
Publishing year 11/21/2013
Current  version 1.4.11
(08/13/2015)
operating system Cross-platform
programming language Java
License BSD 3-Clause License
German speaking No
http://www.fastandeasyhacking.com/

Armitage is a graphical cyber attack management tool for the Metasploit project that visualizes targets and recommends exploits. Armitage is a free, open source network security tool that enables shared sessions and communication through a single Metasploit instance. Armitage is written and supported by Raphael Mudge.

history

Armitage is a GUI front end to the Metasploit framework developed by Raphael Mudge with the aim of helping security professionals better understand hacking and helping them grasp the power of Metasploit. Armitage was originally programmed for cyber security exercises, but has since expanded its user base to include other penetration testers.

properties

Armitage is a scriptable tool that is based on the Metasploit Framework and which was created in cooperation with the Red Team . Armitage enables a user to initiate scans and exploits , receive recommendations for exploits, and use the advanced capabilities of the Metasploit Framework's Meterpreter. Through a Metasploit instance, the same sessions can be used within a team, hosts can be shared, files can be recorded and downloaded and communicated via shared event logs. Bots can also be executed to automate tasks of the Red Team.

Armitage can also be used with Cobalt Strike .

Web links

Individual evidence

  1. Google Code Archive - Long-term storage for Google Code Project Hosting. Accessed April 2, 2017 .
  2. Michael Messner: Hacking with Metasploit: The Comprehensive Handbook on Penetration Testing and Metasploit . 2nd Edition. dpunkt.verlag , 2015, ISBN 978-3-86491-656-4 , p. 100–104 ( limited preview ).
  3. ^ Armitage - Metasploit Unleashed. Retrieved April 2, 2017 (American English).
  4. ^ Adversary Simulation and Red Team Operations Software - Cobalt Strike. Retrieved April 2, 2017 .
  5. ^ Wil Allsopp: Advanced Penetration Testing: Hacking the World's Most Secure Networks . John Wiley & Sons , 2017, ISBN 978-1-119-36768-0 , pp. 89 ff . ( limited preview ).
  6. Patrick Engebretson: The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy . Elsevier , 2017, ISBN 978-0-12-411641-2 , pp. 117 ff . ( limited preview ).
  7. About the Metasploit Meterpreter - Metasploit Unleashed. Retrieved April 2, 2017 (American English).