WinRM / Powershell Remoting
전제조건
공격
# evil-winrm
apt install -y evil-winrm
evil-winrm -i <FQDN/ip> -u <user> -p <pass>
# Metasploit
use auxiliary/scanner/winrm/winrm_login
set rhosts
set username
set password
set domain
exploit
sessions -l
# CrackMapExec
cme winrm <IP/FQDN> -u <user> -p <pass> -d <domain> -X <파워쉘-명령어># 파워쉘 리모팅 (Powershell Remoting)
Enter-PSSession -ComputerName <IP/FQDN> -Credential <domain\user>
# WinRS
winrs -r:<FQDN/Netbios> "<명령어>"
winrs -r:dc01.choi.local "cmd /c hostname"탐지/대응 방안


레퍼런스
Last updated
