1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-06-05 11:06:00 +02:00
tldr/pages/common/evil-winrm.md
Vitor Henrique e7d5609dd3
pages*: improve list placeholders and wording of descriptions (#12111)
* pages*: improve wording and list placeholders

* clamav: fix verb tenses

Co-authored-by: Juri Dispan <juri.dispan@posteo.net>

* buzzphrase: use k instead of n for number of phrases

Co-authored-by: Juri Dispan <juri.dispan@posteo.net>

* adguardhome: use non-default instead of different

* adguardhome: use configuration instead of config

Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>

* goimports, module: fix list placeholders

Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>

* pages*: leave stems and extensions in the same placeholders

* pages*: fix list placeholders

* pages*: fix list placeholders

* pages*: apply suggestions from code review

Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>

* qpdf: enclose n with backticks

Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>

---------

Co-authored-by: Juri Dispan <juri.dispan@posteo.net>
Co-authored-by: K.B.Dharun Krishna <kbdharunkrishna@gmail.com>
Co-authored-by: Lena <126529524+acuteenvy@users.noreply.github.com>
2024-01-31 09:25:19 +05:30

37 lines
1.1 KiB
Markdown

# evil-winrm
> Windows Remote Management (WinRM) shell for pentesting.
> Once connected, we get a PowerShell prompt on the target host.
> More information: <https://github.com/Hackplayers/evil-winrm>.
- Connect to a host:
`evil-winrm --ip {{ip}} --user {{user}} --password {{password}}`
- Connect to a host, passing the password hash:
`evil-winrm --ip {{ip}} --user {{user}} --hash {{nt_hash}}`
- Connect to a host, specifying directories for scripts and executables:
`evil-winrm --ip {{ip}} --user {{user}} --password {{password}} --scripts {{path/to/scripts}} --executables {{path/to/executables}}`
- Connect to a host, using SSL:
`evil-winrm --ip {{ip}} --user {{user}} --password {{password}} --ssl --pub-key {{path/to/pubkey}} --priv-key {{path/to/privkey}}`
- Upload a file to the host:
`PS > upload {{path/to/local/file}} {{path/to/remote/file}}`
- List all loaded PowerShell functions:
`PS > menu`
- Load a PowerShell script from the `--scripts` directory:
`PS > {{script.ps1}}`
- Invoke a binary on the host from the `--executables` directory:
`PS > Invoke-Binary {{binary.exe}}`