WinRM (5985,5986)
Authentication
evil-winrm -i <ip> -u <user> -p <pass>
AMSI Bypass
> #amsiscanbuffer
At line:1 char:1
+ #amsiscanbuffer
+ ~~~~~~~~~~~~~~~
This script contains malicious content and has been blocked by your antivirus software.
# Try this as well
> set-mppreference —disablerealtimemonitoring $true
PowerShell Remoting
PowerShell Remoting by default uses WinRM for Cmdlets such as Enter-PSSession
. Therefore, a user needs to be in the local group Remote Management Users
to be a valid user for these Cmdlets. However, instead of WinRM, SSH can also be used for PowerShell remoting.
Creating a PowerShell remoting session via WinRM in a bind shell can cause unexpected behavior. Opt for
evil-winrm
instead.
> $password = ConvertTo-SecureString "qwertqwertqwert123!!" -AsPlainText -Force
> $cred = New-Object System.Management.Automation.PSCredential("daveadmin", $password)
> Enter-PSSession -ComputerName CLIENTWK220 -Credential $cred
[CLIENTWK220]: PS C:\Users\daveadmin\Documents> whoami
whoami
clientwk220\daveadmin
Last updated
Was this helpful?