15-WinRM (5985,5986)

Windows Remote Management (WinRM:5985 or 5986 if with HTTPS) can be used to facilitate remote access with Windows systems over HTTP(S).

WinRM is used in this ways:


crackmapexec tool:

crackmapexec Performs a brute-force on WinRM in order to identify users and their passwords as well as execute commands on the target system.

evil-winrm

Is a ruby script that can be used to obtain a command shell session on the target system.
Example: evil-winrm.rb -u administrator -p 'tinkerbell' -i <ip> ==> This will automatically provide us with a command shell.


#MSF modules: