Home > Tech > [link] How to use Armitage for vulnerability assessments

[link] How to use Armitage for vulnerability assessments

Great tool and the video linked on the article demonstrates how to use Armitage for vulnerability assessments.

http://searchsecurity.techtarget.com/video/Armitage-tutorial-How-to-use-Armitage-for-vulnerability-assessments

With Armitage, enterprises can easily locate the machines running on a network, including the flavor and version of the OS running on each device. With that information, Armitage provides a thorough list of potentially successful attack methods for each OS version.

Security pros can either run a specific attack method provided by Armitage to see if a machine will be compromised, or they can deploy a “Hail Mary” scenario, which essentially throws every attack method available at a device to determine which would be successful for an attacker.

Armitage even provides the capability to take webcam shots and log keystrokes on victim machines, allowing a more thorough assessment of an organization’s attack surface. With the free Armitage tool, performing vulnerability assessments and securing vulnerable machines has never been easier.

Advertisements
Categories: Tech
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s