Problem solve Get help with specific problems with your technologies, process and projects.

Armitage tutorial: How to use Armitage for vulnerability assessments

Enterprise endpoint diversity has exploded in recent years, with a wide variety of new machines and operating systems -- ranging from Macs, Windows and Linux desktops to iOS and Android mobile devices -- finding their way onto corporate networks. From a security perspective, a multitude of devices and OSes running on a network broadens the attack surface to an almost untenable point. Keeping an eye on and preventing the exploitation of these devices can be a challenge for any organization, especially those on tight budgets.

How can cash-strapped enterprises both get a better handle on the devices running on corporate networks and conduct thorough vulnerability assessments? They can use Armitage, the open source security tool for the Metasploit framework.

In this SearchSecurity screencast, Keith Barker, a Certified Information Systems Security Professional (CISSP) and trainer for CBT Nuggets LLC, guides viewers through an Armitage tutorial, from scanning approved enterprise networks to compromising machines with a variety of readily available attack methods via Metasploit.

With Armitage, enterprises can easily locate the machines running on a network, including the flavor and version of the OS running on each device. With that information, Armitage provides a thorough list of potentially successful attack methods for each OS version. Security pros can either run a specific attack method provided by Armitage to see if a machine will be compromised, or they can deploy a "Hail Mary" scenario, which essentially throws every attack method available at a device to determine which would be successful for an attacker. Armitage even provides the capability to take webcam shots and log keystrokes on victim machines, allowing a more thorough assessment of an organization's attack surface. With the free Armitage tool, performing vulnerability assessments and securing vulnerable machines has never been easier.

Editor's note: While this video discusses general strategies that could be used maliciously, the techniques demonstrated in the video are intended for defensive purposes only, and should not be employed for any other reason.

CBT Nuggets logo

About CBT Nuggets:
CBT Nuggets is a computer-based technology company specializing in cutting-edge online IT training. Founded in 1999 by current CEO Dan Charbonneau, CBT Nuggets provides quick, easy and affordable learning by renowned instructors for individuals, small teams and large organizations. CBT Nuggets also offers free videos on a variety of IT topics on the CBT Nuggets YouTube video channel.

About Keith Barker:
Keith Barker, CISSP, is a trainer for CBT Nuggets and has more than 27 years of IT experience. He is a double CCIE and has been named a Cisco Designated VIP. Keith is also the author of numerous Cisco Press books and articles.

View All Videos