Updating the metasploit framework

This Cortana piece was funded by DARPA’s Cyber Fast Track program. Multi-Player Metasploit with Armitage If you aren’t familiar with the Metasploit Project, it’s an open source collection of safe and vetted exploits.Once an exploit makes it into the Metasploit Framework, it’s immediately available to its ~250K users.The Metasploit Framework isn’t just exploits though, it’s an integration point for offensive capabilities that simply work together.

So, I just realized there isn’t a modern tutorial on how to start Armitage and take advantage of it.

There’s the documentation, but my documentation tries to cover every corner case and it’s not friendly to the novice who wants to try it out quickly.

I do not know of a getting started guide that is up to date with the latest Armitage conventions.

This blog post is my attempt to correct this oversight.

Armitage is a graphical user interface for the Metasploit Framework.

At first glance, it may seem that Armitage is just a pretty front-end on top of Metasploit. Armitage is a scriptable red team collaboration tool.It has a server component to allow a team of hackers to share their accesses to compromised hosts.It’s also possible to write bots that connect to this team server and extend Armitage with scripts written in a language called Cortana.There are several programs that build on the Metasploit Framework and take advantage of it.For example, Rapid7, the company that employs Metasploit’s founder and its core team, has a line of penetration testing products built on the framework.The subject of this tutorial is the open source Armitage GUI, which I wrote.