*** WARNING : This tutorial is for education purpose only. It alert you to update your system once there is any patch or update available. Please do not hack any website, computer and/or network without authorization. Otherwise, you will be put into the jail. ***
Prerequisites
In order to complete this tutorial, you should have an Ubuntu or Windows system as host. Back|Track 4 R2 and Metasploitable as clients on VirtualBox 3.2.
You can download Back|Track 4 R2 at here and Metasploitable at here. Metasploitable is an Ubuntu Server 8.04 that installed some applications with flaws that can be exploited.
The installation of Back|Track 4 R2 is here.
The network interfaces of Back|Track 4 R2 on VirtualBox 3.2 are "NAT and "Host Only (vboxnet0)". The network interface of Metasploitable is "Host Only (vboxnet0)".
The Armitage should be installed on Back|Track 4 R2 and the tutorial is here.
Step 0 :
Run the Metasploitable on VirtualBox first. The IP address should be 192.168.56.101. The run Back|Track 4 R2 on VirtualBox the next and the IP address should be 10.x.x.x of eth0.
Step 1 :
On the Back|Track 4 R2, run the following command to make sure eth0 and eth1 are up and have their IPs.
/etc/init.d/networking restart
Step 2 :
Run the following commands to launch Armitage.
/etc/init.d/mysql start
cd /pentest/exploits/armitage
./armitage.sh
Step 3 :
Select "
Use SSL
" and click "Start MSF
".Then, "
Using database driver mysql
" message box will be displayed. Click "OK
".Step 4 :
Select "
Host
" -- "Nmap Scan
" -- "Intense Scan, all TCP ports
"Wait for the scanning complete.
Step 5 :
Select "
Attacks
" -- "Find Attacks
" -- "by port
".Wait for the scanning complete.
Step 6 :
Select "
Attacks
" -- "Hail Mary
" -- "by port
".Wait for the "
Monitor
" image to change to red colour. If so, the target is exploited. Then, right click on the "Monitor
" image and select "Shell
". To check if the target is privilege escalated by issuing "whoami
" on the Shell. If it shows "root
", you are successfully owned the target.That's all! See you.