Tool Documentation:



armitage Usage Example

root@kali:~# armitage
[*] Starting msfrpcd for you.

teamserver Usage Example

Start teamserver on the external IP ( and set the server password (s3cr3t):

root@kali:~# teamserver s3cr3t
[*] Generating X509 certificate and keystore (for SSL)
[*] Starting RPC daemon
[*] MSGRPC starting on (NO SSL):Msg...
[*] MSGRPC backgrounding at 2014-05-14 15:05:46 -0400...
[*] sleeping for 20s (to let msfrpcd initialize)
[*] Starting Armitage team server
[-] Java 1.6 is not supported with this tool. Please upgrade to Java 1.7
[*] Use the following connection details to connect your clients:
    Port: 55553
    User: msf
    Pass: s3cr3t

[*] Fingerprint (check for this string when you connect):
[+] multi-player metasploit... ready to go

Packages and Binaries:


Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post- exploitation features in the framework.

Installed size: 10.95 MB
How to install: sudo apt install armitage

  • metasploit-framework
  • openjdk-11-jre

root@kali:~# teamserver -h
[*] You must provide: <external IP address> <team password>
    <external IP address> must be reachable by Armitage
          clients on port 55553
    <team password> is a shared password your team uses to
          authenticate to the Armitage team server

Updated on: 2024-Mar-11