WinRM (5895,5896)
Footprinting using nmap
nmap -sV -sC 10.129.201.248 -p5985,5986 --disable-arp-ping -n
Interacting using evil-winrm (Test-WsMan for windows powershell)
evil-winrm -i 10.129.201.248 -u Cry0l1t3 -p P455w0rD!
*Evil-WinRM* PS C:\Users\> download "C:/Users/flag.txt"
Last updated