Armitage
Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes advanced post-exploitation features.
Description
Armitage serves as a graphical cyber attack management interface for the Metasploit framework. It enables red teams to visualize their targets and attacks, receive exploit recommendations, and access advanced post-exploitation capabilities within Metasploit. The tool supports team collaboration through a team server setup, allowing multiple users to coordinate operations.
Use cases include red team engagements where visualization and scripting enhance Metasploit workflows. Armitage closes the gap between automation and the Metasploit console by providing an intuitive interface for managing sessions, modules, and payloads. It requires Metasploit Framework and Java dependencies for operation.
The tool operates in client-server mode, with clients connecting to a team server running on an external IP address. Team members authenticate using a shared password to participate in multi-player Metasploit sessions.
How It Works
Armitage starts the MSFRPC daemon (msfrpcd) for Metasploit RPC communication. The teamserver component launches on a specified external IP (port 55553) with SSL via X509 certificates and keystore. Clients connect using host, port 55553, username 'msf', and shared team password. A unique fingerprint authenticates connections. Java 1.7+ is required; older versions like 1.6 are unsupported.
Installation
sudo apt install armitageFlags
Examples
armitageteamserver 192.168.1.202 s3cr3tteamserver -hteamserver <external IP address> <team password>armitage --connect 192.168.1.202 55553 msf s3cr3tteamserver 192.168.1.202 s3cr3t --fingerprint a3b60bef430037a6b628d9011924341b8c09081