hack3rs.ca network-security
/learning/tools/armitage :: tool-guide-35

defender@hack3rs:~/learning/tools$ open armitage

Armitage

Legacy Metasploit GUI / collaboration

Armitage is a legacy GUI/team collaboration interface for Metasploit, useful mainly as historical training context for understanding earlier offensive workflow orchestration and why modern teams emphasize controlled, auditable testing.

how-to-learn-this-tool-like-a-defender

Study the tool in layers: first what problem it solves, then how to run it safely, then how to interpret output, and finally how to combine it with other evidence. This is how beginners become reliable analysts.

  • $Know when the tool is the right choice (and when it is not).
  • $Run a safe baseline command in a lab or authorized environment.
  • $Interpret the output in context instead of treating it as truth by itself.
  • $Correlate with other evidence sources (logs, packets, assets, owner context).
  • $Document findings and next actions so another analyst can reproduce your work.

preflight-checklist-before-using-tool

  • $Confirm authorization, target scope, and acceptable impact before running commands.
  • $Define the question first (troubleshooting, validation, hunting, triage, remediation proof).
  • $Identify the evidence source you will use to confirm or challenge tool output.
  • $Record time, host, interface/segment, and command used so results are reproducible.
  • $Decide what 'normal' should look like before testing edge cases or suspicious behavior.

how-experts-read-output

  • $Field recognition: Which fields actually matter for the question you asked?
  • $Scope validation: Does this output represent the host/segment/time window you intended?
  • $Confidence check: Is this direct evidence, inference, or a heuristic guess?
  • $Correlation step: Which second source should confirm this result (logs, PCAP, ticket, CMDB, host telemetry)?
  • $Decision step: What action should follow (close, escalate, tune, scan deeper, validate manually)?

official-links

ethical-use-and-defense-scope

Armitage is dual-use. Use it only in authorized defensive labs, internal validation exercises, or approved assessments with explicit scope and owner approval.

Because Armitage is legacy or less actively maintained in many environments, prefer isolated labs, snapshots, and documented rollback plans before using it for training.

The goal is defensive learning and control validation: better detections, safer configurations, stronger policies, and clearer incident response decisions. Avoid novelty-driven use.

tool-history-origin-and-purpose

  • $When created: Armitage became well known in the late 2000s / early 2010s as a Metasploit GUI and collaboration tool.
  • $Why it was created: Users needed a faster, more visual way to operate Metasploit and collaborate during exercises.

It was created to provide a graphical and collaborative interface for Metasploit operations and shared sessions.

why-defenders-still-use-it

Today defenders mainly study Armitage historically to understand earlier offensive workflow UX and to discuss auditability, logging, and modern purple-team process controls.

How the tool evolved
  • +Widely recognized in training and historical Metasploit workflows.
  • +Now primarily a legacy/historical reference in many environments.
  • +Useful as a teaching contrast to modern controlled testing pipelines.

when-this-tool-is-a-good-fit

  • +Historical training on tooling orchestration and auditability.
  • +Discussing collaboration controls in purple-team exercises.
  • +Understanding legacy toolchains and modern governance improvements.

when-to-use-another-tool-or-source

  • !When you need host process/user context, pair with endpoint or OS logs.
  • !When you need ownership and business impact, pair with CMDB/ticketing/asset context.
  • !When the tool output is ambiguous, validate using a second evidence source before concluding.
  • !When production risk is high, test in a lab first and use change coordination.

1. What Armitage Solves for Defenders

Armitage is a legacy GUI/team collaboration interface for Metasploit, useful mainly as historical training context for understanding earlier offensive workflow orchestration and why modern teams emphasize controlled, auditable testing.

Armitage fits the "Legacy Metasploit GUI / collaboration" role in this course. Treat it as one tool in a workflow, not as a complete answer by itself. The key question is what decision quality it improves for a defender.

Before using Armitage, define the operational question first (triage, validation, exposure review, monitoring, forensics, or documentation). Tool selection should follow the question, not the other way around.

2. Defensive Workflow and Scope Discipline

Start with authorization and scope. Document what systems, networks, datasets, or accounts are in scope for Armitage, along with acceptable impact and stop conditions.

Build a repeatable workflow: baseline first, collect evidence, interpret output, correlate with a second source, and document findings with next actions. This turns one-off tool use into professional practice.

Armitage is most effective when paired with other evidence sources such as packet data, logs, asset inventory, tickets, and owner context.

3. How to Read Output Like a Defender

Do not treat Armitage output as absolute truth. Validate scope (did you inspect the right host/time/window/interface?), identify the fields that matter, and note what the tool cannot tell you by itself.

Experienced defenders capture normal examples before investigating anomalies. A known-good baseline helps you explain why output is expected, suspicious, or inconclusive.

Always pair output with a follow-up decision: close, escalate, tune, patch, harden, scan deeper, collect more evidence, or update documentation/runbooks.

4. Teaching and Lab Strategy

Use Armitage in small labs with one clear learning goal at a time. Examples: protocol troubleshooting, password policy validation, wireless baseline building, or artifact triage.

Capture both a normal example and a failure/misuse example. The contrast is what builds expert judgment and prevents overconfidence when the tool is used under pressure.

After each lab, write a short defender report: what was observed, what evidence supports it, what remains unknown, and what control or process should improve next.

scenario-teaching-playbooks

Use these scenario patterns to practice choosing the tool appropriately. The point is not just running commands; it is learning when and why the tool helps in a real defensive workflow.

1. Historical training on tooling orchestration and auditability.

Suggested starting block: Orientation And Safe Startup

  • $Define the question you are trying to answer and the scope you are allowed to inspect.
  • $Collect baseline evidence using the selected command block.
  • $Interpret the result using known-good behavior and environment context.
  • $Correlate with another source (host logs, SIEM, tickets, inventory, or packet data).
  • $Record findings, confidence level, and the next defensive action.

2. Discussing collaboration controls in purple-team exercises.

Suggested starting block: Defender Notes And Evidence Workflow

  • $Define the question you are trying to answer and the scope you are allowed to inspect.
  • $Collect baseline evidence using the selected command block.
  • $Interpret the result using known-good behavior and environment context.
  • $Correlate with another source (host logs, SIEM, tickets, inventory, or packet data).
  • $Record findings, confidence level, and the next defensive action.

3. Understanding legacy toolchains and modern governance improvements.

Suggested starting block: Correlation And Follow-Up

  • $Define the question you are trying to answer and the scope you are allowed to inspect.
  • $Collect baseline evidence using the selected command block.
  • $Interpret the result using known-good behavior and environment context.
  • $Correlate with another source (host logs, SIEM, tickets, inventory, or packet data).
  • $Record findings, confidence level, and the next defensive action.

cli-workflows

Practical defensive workflows and lab-safe commands. Validate in a sandbox or authorized environment before using them in production.

cli-walkthroughs-with-expected-output

Start with one representative command from each workflow block. Read the sample output and explanation so you know what to look for when you run it yourself.

Orientation And Safe Startup

Beginner
Command
armitage --help
Example Output
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ how to read it: Check for expected fields first, then validate whether the output actually answers your question. If not, refine scope or collect a second evidence source before concluding.

Defender Notes And Evidence Workflow

Intermediate
Command
printf "goal:
scope:
expected_output:
normal_pattern:
failure_pattern:
next_action:
" > tool-labs/armitage/notes/session.txt
Example Output
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ how to read it: Check for expected fields first, then validate whether the output actually answers your question. If not, refine scope or collect a second evidence source before concluding.

Correlation And Follow-Up

Advanced
Command
journalctl --since "-15 min" | tail -n 40 || true
Example Output
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ how to read it: Check for expected fields first, then validate whether the output actually answers your question. If not, refine scope or collect a second evidence source before concluding.

command-anatomy-and-expert-usage

This breaks down each command so learners understand intent, risk, and interpretation. Expert use is not about memorizing syntax; it is about selecting the right command for the right question and reading the result correctly.

Orientation And Safe Startup

Beginner
Command
armitage --help
Command Anatomy
  • $Base command: armitage
  • $Primary arguments/options: --help
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Collect, validate, or document evidence in a defensive workflow.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Baseline command: learn what normal output looks like.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Orientation And Safe Startup

Beginner
Command
armitage --help || true
Command Anatomy
  • $Base command: armitage
  • $Primary arguments/options: --help || true
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Collect, validate, or document evidence in a defensive workflow.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Intermediate step: refine scope or extract more useful evidence.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Orientation And Safe Startup

Beginner
Command
mkdir -p tool-labs/armitage/{notes,artifacts,screenshots}
Command Anatomy
  • $Base command: mkdir
  • $Primary arguments/options: -p tool-labs/armitage/{notes,artifacts,screenshots}
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Collect, validate, or document evidence in a defensive workflow.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Advanced step: use after baseline and validation are understood.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Defender Notes And Evidence Workflow

Intermediate
Command
printf "goal:
scope:
expected_output:
normal_pattern:
failure_pattern:
next_action:
" > tool-labs/armitage/notes/session.txt
Command Anatomy
  • $Base command: printf
  • $Primary arguments/options: "goal: scope: expected_output: normal_pattern: failure_pattern:
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Collect, validate, or document evidence in a defensive workflow.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Baseline command: learn what normal output looks like.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Defender Notes And Evidence Workflow

Intermediate
Command
cat tool-labs/armitage/notes/session.txt
Command Anatomy
  • $Base command: cat
  • $Primary arguments/options: tool-labs/armitage/notes/session.txt
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Collect, validate, or document evidence in a defensive workflow.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Intermediate step: refine scope or extract more useful evidence.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Defender Notes And Evidence Workflow

Intermediate
Command
printf "timestamp,observation,confidence,validation_source
" > tool-labs/armitage/notes/evidence.csv
Command Anatomy
  • $Base command: printf
  • $Primary arguments/options: "timestamp,observation,confidence,validation_source " > tool-labs/armitage/notes/evidence.csv
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Collect, validate, or document evidence in a defensive workflow.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Advanced step: use after baseline and validation are understood.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Correlation And Follow-Up

Advanced
Command
journalctl --since "-15 min" | tail -n 40 || true
Command Anatomy
  • $Base command: journalctl
  • $Primary arguments/options: --since "-15 min" | tail
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Collect, validate, or document evidence in a defensive workflow.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Baseline command: learn what normal output looks like.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Correlation And Follow-Up

Advanced
Command
tshark -r sample.pcap -q -z io,phs || true
Command Anatomy
  • $Base command: tshark
  • $Primary arguments/options: -r sample.pcap -q -z io,phs
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Intermediate step: refine scope or extract more useful evidence.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Correlation And Follow-Up

Advanced
Command
printf "finding,owner,action,status
" > tool-labs/armitage/notes/actions.csv
Command Anatomy
  • $Base command: printf
  • $Primary arguments/options: "finding,owner,action,status " > tool-labs/armitage/notes/actions.csv
  • $Operator goal: run this command only when it answers a clear defensive question.
Use And Risk

$ intent: Collect, validate, or document evidence in a defensive workflow.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Advanced step: use after baseline and validation are understood.

Show sample output and interpretation notes
# review output for expected fields, errors, and warnings
# compare against a known-good baseline in your environment

$ expert reading pattern: Confirm the output matches your intended scope, identify the key fields, then validate with a second source before making decisions.

Orientation And Safe Startup

armitage --help
armitage --help || true
mkdir -p tool-labs/armitage/{notes,artifacts,screenshots}

Defender Notes And Evidence Workflow

printf "goal:
scope:
expected_output:
normal_pattern:
failure_pattern:
next_action:
" > tool-labs/armitage/notes/session.txt
cat tool-labs/armitage/notes/session.txt
printf "timestamp,observation,confidence,validation_source
" > tool-labs/armitage/notes/evidence.csv

Correlation And Follow-Up

journalctl --since "-15 min" | tail -n 40 || true
tshark -r sample.pcap -q -z io,phs || true
printf "finding,owner,action,status
" > tool-labs/armitage/notes/actions.csv

defensive-use-cases

  • $Historical training on tooling orchestration and auditability.
  • $Discussing collaboration controls in purple-team exercises.
  • $Understanding legacy toolchains and modern governance improvements.

common-mistakes

  • $Treating legacy tooling as a modern production practice baseline.
  • $Using GUI convenience without process logging and scope controls.
  • $Failing to map activities to defensive validation outcomes.

expert-habits-for-free-self-study

This site is a free teaching resource. Use this loop to train yourself like a working defender: ask a question, collect evidence, interpret carefully, validate, document, and repeat.

  • $Start with the least invasive command that can answer your question.
  • $Write down why you ran the command before interpreting the output.
  • $Treat output as evidence, not truth, until validated against another source.
  • $Save exact commands used so another analyst can reproduce your findings.
  • $Capture 'normal' examples during calm periods for future comparison.
  • $Escalate only after you can explain what you observed and why it matters.

knowledge-check

  • ?What question is this tool best suited to answer first?
  • ?What permissions or scope approvals are needed before using it?
  • ?Which second evidence source should you pair with it for higher confidence?
  • ?What does normal output look like for your environment?

teaching-answer-guide

Show teaching hints
  • #Start from the tool’s role and the scenario you are investigating.
  • #Never rely on one tool alone for high-confidence incident decisions.
  • #Document normal output patterns during calm periods so anomalies are easier to spot.
  • #Prefer lab validation for new commands, rules, or scans before production use.

practice-plan

# Define one authorized learning goal for Armitage and write the scope before opening the tool.
# Capture a normal example and record the exact command/workflow used.
# Create one failure or misuse example and document how to recognize it.
# Write a short defender summary with evidence, confidence, and next actions.
<- previous tool Airgeddon -> next tool sqlmap