Forum Thread: Armitage Nothing Is Working Evan When the Firewall Is Off

I was trying to hack my pc(windows 10) with my laptop (Kali Linux) I did an nmap scan and my pc showed up so I disabled the firewall and I tried everything, nothing worked even hail mary please help me

4 Responses

Your PC must be vulnerable to the exploits that are available for Metasploit/Armitage. If your PC is fully up to date, none are going to work. There are no zero day exploits right now for Windows 10 that's on Metasploit/Armitage.

A better test would be to create a malicious trojan, set up a listener on Kali, transfer the Trojan to the computer and run it. Make sure Defender is turned off.

You could also get yourself a vulnerable version of Windows XP that's vulnerable to the exploit Ms08-067 and try that. Or a vulnerable version of Windows 7-10 that is vulnerable to the exploit MS17-010 (Eternal Blue)

oh, thank you know I understand. I thought if I disabled my firewall it would work

check & learn about nesus he work like n map i love it.

These tools are your friend - learn to use them and understand how to implement them. Netstat - NMAP - NCAT- .

Since you are investigating if armitage and metasploit are working the first thing I would do is to gather information about your target.

On your Target Computer run ifconfig - note down your IP address and Mac address.

Then on the target computer from command line - run
sudo netstat -lt tcp listening ports
sudo netstat -au udp listening ports
Take note of these ports.

Then on the Host computer from the command line run this command

sudo nmap --top-ports 10 "your target ip address"
This will give you the top 10 ports opened or closed on the target system.

Then run Armitage again and run a nmap scan. You should see exactly the same information appearing about ports opened as you did from your command line reconnaissances. If you don't then something is really a miss. Unless all ports are closed or your firewall on the target computer is up and running.

You can find this out by running sudo nmap -sA "target ip" if you get any error then a firewall exist - try this sudo nmap -sA -PN "target ip " this will scan the target even if a firewall exist.

as I said netcat - nmap - netstat are your friends - another good tools is ipangry.

Share Your Thoughts

  • Hot
  • Active