📘
OSCP Exam Prep
OSCP Exam Prep
OSCP Exam Prep
  • Reference List
  • Guideline
  • Commons
    • Basic Scans
    • Service Enumeration
      • HTTP(S) (80 / 443)
      • SMB (139 / 445)
      • FTP (21)
      • DNS (53)
      • SSH (22)
      • LDAP (389/636/3268)
      • Kerberos (88)
      • SNMP (161)
      • SMTP (25)
      • RDP (3389)
      • Evil-WinRM (5985/5986)
      • MYSQL (3306)
      • MSSQL (1433)
    • Default/Common Credentials
    • Shells
      • TTY Shell
    • File Transfer
    • KeePass Database
    • Port Forwarding
    • File Metadata
  • Attacks
    • Run a command x times
    • Public Exploits
    • User Creation
    • Password Cracking
      • Using custom wordlists
    • LFI/RFI
    • SQLi
    • PwnKit
    • SAM and SYSTEM files
    • Phishing for Access (Requires MailSVR)
    • GitDumper
  • Enumeration
    • Linux
    • Windows
  • Privilege Escalation
    • Linux
    • Windows
  • Port Forwarding Extras
    • Linux
    • Windows
  • Active Directory
    • Enumeration
    • Lateral Movement
    • Privilege Escalation
Powered by GitBook
On this page
  • 1. ToDo
  • Scanning
  • Initiate connection
  • Extract data
  • Alternative: cadaver
  1. Commons
  2. Service Enumeration

Evil-WinRM (5985/5986)

1. ToDo

Scanning

crackmapexec --verbose winrm [--port <port>] <IP>
crackmapexec --verbose winrm [--port <port>] <IP> -u <username> -p <password>

nxc winrm <IP> -d <domain name> -u users.txt -p passwords.txt --continue-on-success
nxc winrm <IP> -d <domain name> -u users.txt -H hashes.txt --continue-on-success

Initiate connection

evil-winrm -i <IP> [-P <port>] -u <username> -p <password>
evil-winrm -i <IP> [-P <port>] -u <username> -H <hash>

Extract data

While in a winrm session - 
    download <source file> <destination file>
    
While outside a winrm session - 
	evil-winrm -i <ip> -u <username> -p <password> -s "source_file" -d "destination_directory"
		# Used to upload files onto target machine
	evil-winrm -i <ip> -u <username> -p <password> -g "source_file" -d "destination_directory"
		# Used to download files from target machine
	evil-winrm -i <ip> -u <username> -p <password> -s "powershell script"
		# Used to run powershell script

Alternative: cadaver

cadaver http://<ip>
	# Verify usability with: crackmapexec winrm <ip>
	# Look for HTTP entries from output

PreviousRDP (3389)NextMYSQL (3306)

Last updated 3 months ago