In the previous sections, we added a host to the Armitage console and performed a port scan and enumeration on it using NMAP. Now, we know that it's running a Debian-based Linux system. The next step is to find all possible attacks matching our target host. In order to fetch all applicable attacks, select the Attacks
;menu and click on Find Attacks
. Now, the Armitage console will query the backend database for all possible matching exploits against the open ports that we found during enumeration earlier, as shown in the following screenshot:
Once the Armitage console finishes querying for possible exploits, you can see the list of applicable exploits by right-clicking on the host and selecting the Attack
;menu. In this case, we'll try to exploit the postgresql
vulnerability as shown in the following screenshot:
Upon selecting the attack type as PostgreSQL for Linux Payload Execution
, we are presented with several exploit options as shown in the following screenshot...