1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-04-21 21:42:08 +02:00
tldr/pages/common/evil-winrm.md
Vitor Henrique e7d5609dd3
pages*: improve list placeholders and wording of descriptions (#12111)
* pages*: improve wording and list placeholders

* clamav: fix verb tenses

Co-authored-by: Juri Dispan <juri.dispan@posteo.net>

* buzzphrase: use k instead of n for number of phrases

Co-authored-by: Juri Dispan <juri.dispan@posteo.net>

* adguardhome: use non-default instead of different

* adguardhome: use configuration instead of config

Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>

* goimports, module: fix list placeholders

Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>

* pages*: leave stems and extensions in the same placeholders

* pages*: fix list placeholders

* pages*: fix list placeholders

* pages*: apply suggestions from code review

Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>

* qpdf: enclose n with backticks

Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>

---------

Co-authored-by: Juri Dispan <juri.dispan@posteo.net>
Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>
Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>
2024-01-31 09:25:19 +05:30

1.1 KiB

evil-winrm

Windows Remote Management (WinRM) shell for pentesting. Once connected, we get a PowerShell prompt on the target host. More information: https://github.com/Hackplayers/evil-winrm.

  • Connect to a host:

evil-winrm --ip {{ip}} --user {{user}} --password {{password}}

  • Connect to a host, passing the password hash:

evil-winrm --ip {{ip}} --user {{user}} --hash {{nt_hash}}

  • Connect to a host, specifying directories for scripts and executables:

evil-winrm --ip {{ip}} --user {{user}} --password {{password}} --scripts {{path/to/scripts}} --executables {{path/to/executables}}

  • Connect to a host, using SSL:

evil-winrm --ip {{ip}} --user {{user}} --password {{password}} --ssl --pub-key {{path/to/pubkey}} --priv-key {{path/to/privkey}}

  • Upload a file to the host:

PS > upload {{path/to/local/file}} {{path/to/remote/file}}

  • List all loaded PowerShell functions:

PS > menu

  • Load a PowerShell script from the --scripts directory:

PS > {{script.ps1}}

  • Invoke a binary on the host from the --executables directory:

PS > Invoke-Binary {{binary.exe}}