<html> <p><img src="https://1.bp.blogspot.com/-L5fDxh16Xio/TxwzuI7m8WI/AAAAAAAACQI/Loxup2FK5zQ/s1600/Armitage_MSF.png" width="723" height="462"/></p> <p>Is a graphical cyber attack management tool for the <a href="https://en.wikipedia.org/wiki/Metasploit_Project">Metasploit Project</a> that visualizes targets and recommends exploits. It is a <a href="https://en.wikipedia.org/wiki/Free_and_open_source">free and open source</a> <a href="https://en.wikipedia.org/wiki/Network_security">network security</a> tool notable for its contributions to red team collaboration allowing for, shared sessions, data, and communication through a single <a href="https://en.wikipedia.org/wiki/Metasploit_Project">Metasploit</a> instance. Armitage is written and supported by Raphael Mudge </p> <p><img src="https://www.offensive-security.com/wp-content/uploads/2015/04/armitage-pre-init.png" width="1440" height="900"/></p> <p>Armitage is a GUI front-end for the <a href="https://en.wikipedia.org/wiki/Metasploit_Project">Metasploit Framework</a> developed by Raphael Mudge with the goal of helping security professionals better understand hacking and to help them realize the power of Metasploit. It was originally made for <a href="https://en.wikipedia.org/w/index.php?title=Cyber_Defense_Exercises&action=edit&redlink=1">Cyber Defense Exercises</a>, but has since expanded its user base to other <a href="https://en.wikipedia.org/wiki/Penetration_test">penetration testers</a>.</p> <p><img src="https://www.offensive-security.com/wp-content/uploads/2015/03/Armitage_scanned_hosts.png" width="921" height="776"/></p> <p><img src="https://www.offensive-security.com/wp-content/uploads/2015/03/Armitage_5_shells.png" width="921" height="779"/></p> <p>Armitage is a scriptable <a href="https://en.wikipedia.org/wiki/Red_team">red team</a> collaboration tool built on top of the Metasploit Framework. Through Armitage, a user may launch scans and exploits, get exploit recommendations, and use the advanced features of the Metasploit Framework's meterpreter. </p> </html>
author | astralsage |
---|---|
permlink | armitage-computing |
category | hacking |
json_metadata | {"tags":["hacking","security","opensource","computing"],"image":["https://1.bp.blogspot.com/-L5fDxh16Xio/TxwzuI7m8WI/AAAAAAAACQI/Loxup2FK5zQ/s1600/Armitage_MSF.png","https://www.offensive-security.com/wp-content/uploads/2015/04/armitage-pre-init.png","https://www.offensive-security.com/wp-content/uploads/2015/03/Armitage_scanned_hosts.png","https://www.offensive-security.com/wp-content/uploads/2015/03/Armitage_5_shells.png"],"links":["https://en.wikipedia.org/wiki/Metasploit_Project","https://en.wikipedia.org/wiki/Free_and_open_source","https://en.wikipedia.org/wiki/Network_security","https://en.wikipedia.org/w/index.php?title=Cyber_Defense_Exercises&action=edit&redlink=1","https://en.wikipedia.org/wiki/Penetration_test","https://en.wikipedia.org/wiki/Red_team"]} |
created | 2016-08-19 11:49:36 |
last_update | 2016-08-19 11:49:36 |
depth | 0 |
children | 0 |
last_payout | 2016-09-19 12:43:09 |
cashout_time | 1969-12-31 23:59:59 |
total_payout_value | 0.000 HBD |
curator_payout_value | 0.000 HBD |
pending_payout_value | 0.000 HBD |
promoted | 0.000 HBD |
body_length | 2,128 |
author_reputation | 51,875,554 |
root_title | "Armitage (computing)" |
beneficiaries | [] |
max_accepted_payout | 1,000,000.000 HBD |
percent_hbd | 10,000 |
post_id | 887,510 |
net_rshares | 641,616,494 |
author_curate_reward | "" |
voter | weight | wgt% | rshares | pct | time |
---|---|---|---|---|---|
rubenalexander | 0 | 537,393,537 | 100% | ||
astralsage | 0 | 52,705,550 | 100% | ||
g33kspeed | 0 | 51,517,407 | 100% |