WinRM - Port 5985, 5986
Basic info
Default Ports
Architecture
Reconnaissance & Enumeration
Port Scanning
Banner Grabbing
Windows-Based Testing
Shodan Queries
Authentication Methods
Credential-Based Attacks
Username Enumeration
Brute Force Attacks
Password Spraying
Post-Authentication Exploitation
Evil-WinRM (Primary Tool)
Advanced Evil-WinRM Features
Kerberos Authentication (v3.x+)
Certificate-Based Authentication
File Operations
Script Execution
Binary Execution
Session Logging
Bypass AMSI
PowerShell-Based Connections
From Windows Systems
From Linux Systems
NTLM Relay Attacks
Direct Relay to WinRM (Updated 2023+)
Mitigations
Privilege Escalation via WinRM
Loading PowerShell Scripts
Credential Harvesting
Advanced Techniques
Constrained Language Mode Bypass
Certificate-Based Authentication Exploitation
WinRM + CredSSP for Double-Hop
Forcing WinRM Remotely
Cloud-Specific: Azure OMI Exploitation
OMIGOD (CVE-2021-38647)
Lateral Movement
One-Liner Lateral Movement
Using CrackMapExec for Spray
Defense Evasion
AMSI Bypass
Logging Evasion
Obfuscation
Detection & Defense
Enable Logging
Monitor for Suspicious Activity
Hardening WinRM
Network Segmentation
Common Issues & Troubleshooting
Connection Errors
IPv6 Connections with Evil-WinRM
Practical Attack Scenarios
Scenario 1: Internal Penetration Test
Scenario 2: Post-Exploitation
Scenario 3: NTLM Relay Chain
Tool Reference
Must-Have Tools
Installation Commands
Cheat Sheet
Quick Reference Commands
Conclusion
Additional Resources
Last updated