🔬WinRM
Lab 1
🔬 WinRM: Exploitation with Metasploit
Target IP:
10.4.30.175
WinRM exploitation
Dictionaries to use:
/usr/share/metasploit-framework/data/wordlists/common_users.txt
/usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
Enumeration
CrackMapExec Brute-force
Use
crackmapexec
tool to confirm WinRM is running on port5985
Execute specific Windows commands
evil-WinRM Shell
Get a command shell session using
evil-winrm
tool
Meterpreter Session
Last updated