TL;DR
The ‘Armitage check exploit’ refers to a vulnerability where attackers can potentially identify if you’re using the Armitage cyber security tool. This guide explains how to confirm if you are vulnerable and, more importantly, how to mitigate the risk by disabling unnecessary features or implementing network controls.
Understanding the Problem
Armitage is a powerful penetration testing tool built on top of Metasploit. A check exists that allows remote attackers to determine if an Armitage instance is running on a target system. This doesn’t give them direct access, but it reveals information about your security setup which can aid their attacks.
Checking for Vulnerability
- Nmap Scan: The most common method attackers use is an Nmap scan targeting port 8080 (the default Armitage port). You can simulate this yourself.
- Open a terminal or command prompt.
- Run the following Nmap command:
nmap -p 8080 <target_IP_address> - If you receive a response indicating an open port and Armitage-specific banners, your instance is likely detectable.
- Browser Check: Attempt to access the Armitage web interface directly in a browser.
- Navigate to
http://<target_IP_address>:8080. - If you see the Armitage login page, it confirms accessibility from outside your network (and potential vulnerability).
- Navigate to
Mitigation Steps
- Firewall Rules: This is the most effective solution.
- Configure your firewall to block external access to port 8080. Only allow connections from trusted IP addresses or networks (e.g., your internal network).
- Example using UFW (Uncomplicated Firewall) on Linux:
sudo ufw deny 8080sudo ufw allow from <trusted_IP_address> to any port 8080
- Change the Port: Altering the default Armitage port makes it harder for automated scans to find your instance.
- Edit the
armitage.propertiesfile (location varies depending on installation). - Find the line containing
http.port=8080and change the value to a non-standard port number (e.g., 9001).http.port=9001 - Restart Armitage for the changes to take effect. Remember to update your firewall rules accordingly!
- Edit the
- Disable Web Interface (If Possible): If you don’t require remote access via the web interface, disable it entirely.
- This option may not be available in all Armitage configurations. Check documentation for your specific version.
- VPN Usage: Run Armitage within a Virtual Private Network (VPN).
- A VPN masks your public IP address, making it more difficult to directly target your instance.
Important Considerations
While these steps reduce the risk of detection, they don’t eliminate it entirely. Regularly review your security configuration and keep Armitage updated with the latest patches.

