BSWJ: Armitage - Host Management

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

6 minutes
Video Transcription
Hello, everyone. And welcome back to breaking stuff with Joe, I, as always in your host, Joe Perry. And today we're talking about Armitage once more. Now, you've hopefully already seen one Armitage video in the breaking stuff with Joe Serious today is going to be sort of a sequel. Video to that.
Where, instead of just talking about the gooey and how you can launch tonight, get run, Armitage, we're actually going to see a specific use case in which we perform a host management and host discovery.
So again, as if you haven't seen the previous video, Armitage is a spectacularly useful collaborative, gooey for the medicine framework, provides guidance and information and mapping through every stage of the hacking process. Today, as I said, we're talking about host management. So we're gonna be looking at how you actually discover host with networks. Can you get important previous network scans
into Armitage in how you can use that information and the maps Armitage will give you
in order to enable speed and improve your hacking process? So today we're gonna again discuss importing scans, running new scans and managing hosts, keep watching and learn how you can use Armitage host management to break stuff in every part of your job.
And once again we're working out of our trusty Callie V. M. And again this video. We're looking at host management specifically. So our last video, we kind of walked through Armitage here. We're just specifically looking to see how we could work with us. And there are two primary ways that you engage in in adding hosts to your system
so that you can look at them through the Armitage windows and kind of manipulate them with your different options. Here,
the first of those two ways is importing hosts, and the second is actually creating host scans and performing new host scans to find them yourself. So we're gonna start out by importing hosts from an end map file that we've already created
on the way we did that because it is relevant
to create an end, my file that could be ingested by Armitage, you're gonna run a command
that's gonna look something vaguely like this 10 dot over too.
24. That's my current subject Mass or my current, yet some net on. Then you're going to run it with the output auction tack o X, and that indicates that is going to be an XML file. And then whatever filing you have, Armitage is designed to import and map results as XML files,
and it's very, very important that you do it correctly. Otherwise,
Armitage won't know what it's looking at, and you'll be stuck
back in here to our window, we're going to select
an end mops can that I have already run that I just totaled and map dot xml
and it will important. You can see it imports the hosts, and it says it is successfully important, and you can tell that it's actually successfully imported. When these pop up. These computers indicate based air. These computer icons indicate basically the hosts that Armitage knows about. And usually whatever information has you could see that unknown. If you if you right click on it,
you'll see that it has different operating system options that you can select.
So if I were, for example, if I believed that the target was a Mac OS X box, I could click that
and it would. There we go. It'll populate with that little apple logo on the screens of the contract it
now That said, we don't actually know,
uh and so we're going to set that back to unknown.
So that's the first way to get hosts in your system just by importing and mops can that already exists. But what if instead,
I wanted to create this Syria where this list of computers from scratch. Well, then I would just come down here and do this and maps can and you can see we have a few different options. The intense scan, intense can plus UDP all tastes, reports, no ping, all the different options for scanning. In this case, we're gonna run a quick scan with a less detect,
and we're again going to use that same son that range and see if that might not give us a little bit more information about its targets. Because of the end up scan, Iran was very basic. We got almost no information back,
but by performing a little bit more of a robust search, we might get a little bit more information,
and it takes a little bit of time as and my skin's generally do. Unfortunately, we don't have too many hosts, so we can pretty quickly identify
what hosts our act.
Hosts are active and what they're operating systems might or might not be.
All right, there you go. And you can see here that three of them it was unable to identify. However, one of them, it was able to say, is in fact, a linens machine and you can see our little penguin there.
And, of course, it's got a little bit more information. Log in service is log in information. Here, you can see an attempt to log in if you have the user name and password.
That's something that's enabled because it knows what it's targeted.
So those are the two ways that you can get hosts in tow. Armitage, In our next video, we're actually gonna look at what we can do against hostesses hosts once they've been identified. Short video sweetened to the point. Hopefully, you now understand the host management process in Armitage, and you can use it to go out there and break stuff
again. Thank you all for watching, and if you're interested in creating content like this,
I cannot stress enough how important it is to us that our community be involved. How effective that makes this platform and how much you can give back to the community, build your own career and even learn more about what you're teaching. One of the great things about teaching this Siri's for me is that I'm constantly learning new things or being reminded of things
that I haven't haven't talked about her used in a very long time.
So I really, really recommend if you have something you think you'd be interested in teaching. Or if you just want to give back to the community, go to Sai Berries Contribute Page, the link for which will be included with this video, and you can see about giving back to your community. Until then, thank you all for watching. There's one more video in this Armitage Siri's in which we're going to talk about exploitation
through this tool.
Uh, I has always have been your host, Joe Carey, and you've been watching breaking stuff. Joe here on Cyber Eri on demand