| | at : |
Archive

[MAD-METASPLOIT] 0x41 - Armitage 하훌 rwxr-xr-x 0 8/07/2017



[MAD-METASPLOIT] 0x41 - Armitage

Permission rw-r--r--
Author 하훌
Date and Time 8/07/2017
Label
License 크리에이티브 커먼즈 라이선스





### armitage?



### How to Install?



### How to use?



### msgrpc와 armitage

# ./msfd

[*] Initializing msfd...
[*] Running msfd...


HAHWUL #> load msgrpc Pass=secret_password
[*] MSGRPC Service: 127.0.0.1:55552
[*] MSGRPC Username: msf
[*] MSGRPC Password: secret_password
[*] Successfully loaded plugin: msgrpc

Other shell..

#> cd [your armitage directory]
#> java -jar armitage

Reference

http://www.hahwul.com/2017/08/metasploit-msgrpc-msfconsole-armitage.html

Share







HAHWUL
HACKING | PENETRATION-TEST | CODING
HACKERONE : GIT : 0DAY-TODAY : EXPLOIT-DB : PACKETSTORM
GOOGLE+ | HAHWUL@GMAIL.COM | TWITTER
WWW.HAHWUL.COM




0 개의 댓글:

댓글 쓰기