O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Find attacks against a host

We will use armitage to find attacks against hosts:

  1. At this point, let's work with our Metasploitable machine, which currently has an IP address of 192.168.56.104. Click on it once to select it (this will be denoted with a green dotted outline).
  2. If you right-click on the device, you will see a variety of options - select Services. This will bring up a list of all listening ports and services for that host. Scroll down a bit and take a look at all the information provided:
Armitage host services screen
  1. Let's find some possible attacks against the hosts. Click on Attacks | Find Attacks from the top. This could ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required