Time
6 minutes
Difficulty
Intermediate

Video Transcription

00:08
Hello, everyone. And welcome back to breaking stuff with Joe, I, as always in your host, Joe Perry. And today we're talking about Armitage once more. Now, you've hopefully already seen one Armitage video in the breaking stuff with Joe Serious today is going to be sort of a sequel. Video to that.
00:23
Where, instead of just talking about the gooey and how you can launch tonight, get run, Armitage, we're actually going to see a specific use case in which we perform a host management and host discovery.
00:31
So again, as if you haven't seen the previous video, Armitage is a spectacularly useful collaborative, gooey for the medicine framework, provides guidance and information and mapping through every stage of the hacking process. Today, as I said, we're talking about host management. So we're gonna be looking at how you actually discover host with networks. Can you get important previous network scans
00:50
into Armitage in how you can use that information and the maps Armitage will give you
00:55
in order to enable speed and improve your hacking process? So today we're gonna again discuss importing scans, running new scans and managing hosts, keep watching and learn how you can use Armitage host management to break stuff in every part of your job.
01:10
And once again we're working out of our trusty Callie V. M. And again this video. We're looking at host management specifically. So our last video, we kind of walked through Armitage here. We're just specifically looking to see how we could work with us. And there are two primary ways that you engage in in adding hosts to your system
01:26
so that you can look at them through the Armitage windows and kind of manipulate them with your different options. Here,
01:32
the first of those two ways is importing hosts, and the second is actually creating host scans and performing new host scans to find them yourself. So we're gonna start out by importing hosts from an end map file that we've already created
01:46
on the way we did that because it is relevant
01:48
to create an end, my file that could be ingested by Armitage, you're gonna run a command
01:53
that's gonna look something vaguely like this 10 dot over too.
01:57
Oh,
01:59
24. That's my current subject Mass or my current, yet some net on. Then you're going to run it with the output auction tack o X, and that indicates that is going to be an XML file. And then whatever filing you have, Armitage is designed to import and map results as XML files,
02:15
and it's very, very important that you do it correctly. Otherwise,
02:19
Armitage won't know what it's looking at, and you'll be stuck
02:22
so
02:23
back in here to our window, we're going to select
02:25
an end mops can that I have already run that I just totaled and map dot xml
02:30
and it will important. You can see it imports the hosts, and it says it is successfully important, and you can tell that it's actually successfully imported. When these pop up. These computers indicate based air. These computer icons indicate basically the hosts that Armitage knows about. And usually whatever information has you could see that unknown. If you if you right click on it,
02:51
you'll see that it has different operating system options that you can select.
02:55
So if I were, for example, if I believed that the target was a Mac OS X box, I could click that
03:01
and it would. There we go. It'll populate with that little apple logo on the screens of the contract it
03:07
now That said, we don't actually know,
03:09
uh and so we're going to set that back to unknown.
03:15
So that's the first way to get hosts in your system just by importing and mops can that already exists. But what if instead,
03:22
I wanted to create this Syria where this list of computers from scratch. Well, then I would just come down here and do this and maps can and you can see we have a few different options. The intense scan, intense can plus UDP all tastes, reports, no ping, all the different options for scanning. In this case, we're gonna run a quick scan with a less detect,
03:43
and we're again going to use that same son that range and see if that might not give us a little bit more information about its targets. Because of the end up scan, Iran was very basic. We got almost no information back,
03:54
but by performing a little bit more of a robust search, we might get a little bit more information,
04:00
and it takes a little bit of time as and my skin's generally do. Unfortunately, we don't have too many hosts, so we can pretty quickly identify
04:10
what hosts our act.
04:12
Hosts are active and what they're operating systems might or might not be.
04:19
All right, there you go. And you can see here that three of them it was unable to identify. However, one of them, it was able to say, is in fact, a linens machine and you can see our little penguin there.
04:32
And, of course, it's got a little bit more information. Log in service is log in information. Here, you can see an attempt to log in if you have the user name and password.
04:41
That's something that's enabled because it knows what it's targeted.
04:44
So those are the two ways that you can get hosts in tow. Armitage, In our next video, we're actually gonna look at what we can do against hostesses hosts once they've been identified. Short video sweetened to the point. Hopefully, you now understand the host management process in Armitage, and you can use it to go out there and break stuff
05:01
again. Thank you all for watching, and if you're interested in creating content like this,
05:05
I cannot stress enough how important it is to us that our community be involved. How effective that makes this platform and how much you can give back to the community, build your own career and even learn more about what you're teaching. One of the great things about teaching this Siri's for me is that I'm constantly learning new things or being reminded of things
05:23
that I haven't haven't talked about her used in a very long time.
05:26
So I really, really recommend if you have something you think you'd be interested in teaching. Or if you just want to give back to the community, go to Sai Berries Contribute Page, the link for which will be included with this video, and you can see about giving back to your community. Until then, thank you all for watching. There's one more video in this Armitage Siri's in which we're going to talk about exploitation
05:46
through this tool.
05:46
Uh, I has always have been your host, Joe Carey, and you've been watching breaking stuff. Joe here on Cyber Eri on demand

How to Use Armitage - Host Management (BSWJ)

Learn to use the hacking tool Armitage in order to perform network scans, import existing scans, and map out a target environment to enable further stages of the hacking process.

Instructed By

Instructor Profile Image
Joe Perry
Senior Technical Instructor at FireEye, Inc
Instructor