From 60964c46cb3d0e3944eecea795d5b108058c0dbb Mon Sep 17 00:00:00 2001 From: Juri Dispan Date: Thu, 31 Oct 2024 22:43:58 +0100 Subject: [PATCH] nxc-wmi: add page (#14364) * nxc-wm Co-authored-by: Wiktor Perskawiec --- pages/common/nxc-wmi.md | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 pages/common/nxc-wmi.md diff --git a/pages/common/nxc-wmi.md b/pages/common/nxc-wmi.md new file mode 100644 index 0000000000..6f7f47f6be --- /dev/null +++ b/pages/common/nxc-wmi.md @@ -0,0 +1,20 @@ +# nxc wmi + +> Pentest and exploit the Windows Management Instrumentation (WMI). +> More information: . + +- Search for valid credentials by trying out every combination in the specified lists of [u]sernames and [p]asswords: + +`nxc wmi {{192.168.178.2}} -u {{path/to/usernames.txt}} -p {{path/to/passwords.txt}}` + +- Authenticate via local authentication (as opposed to authenticating to the domain): + +`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --local-auth` + +- Issue the specified WMI query: + +`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --wmi {{wmi_query}}` + +- Execute the specified command on the targeted host: + +`nxc wmi {{192.168.178.2}} -u {{username}} -p {{password}} --x {{command}}`