Land #11437, Add winrm docs

4.x
Jacob Robles 2019-02-19 12:58:14 -06:00 committed by Metasploit
parent 87b3833276
commit 58756790fc
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
2 changed files with 57 additions and 0 deletions

View File

@ -0,0 +1,23 @@
## Description
This module sends a request to an HTTP/HTTPS service to see if it is a WinRM service. If it is a WinRM service, it also gathers the Authentication Methods supported.
## Verification Steps
1. Do: ```use auxiliary/scanner/winrm/winrm_auth_methods```
2. Do: ```set RHOSTS [IP]```
3. Do: ```run```
## Scenarios
```
msf > use auxiliary/scanner/winrm/winrm_auth_methods
msf auxiliary(scanner/winrm/winrm_auth_methods) > set RHOSTS 1.1.1.10
RHOSTS => 1.1.1.10
msf auxiliary(scanner/winrm/winrm_auth_methods) > run
[+] 1.1.1.10:5985: Negotiate protocol supported
[+] 1.1.1.10:5985: Basic protocol supported
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/winrm/winrm_auth_methods) >
```

View File

@ -0,0 +1,34 @@
## Description
This module runs arbitrary Windows commands using the WinRM Service. It needs login credentials to do so.
## Verification Steps
1. Do: ```use auxiliary/scanner/winrm/winrm_cmd```
2. Do: ```set CMD [WINDOWS COMMAND]```
3. Do: ```set RHOSTS [IP]```
4. Do: ```set USERNAME [USERNAME]```
5. Do: ```set PASSWORD [PASSWORD]```
6. Do: ```run```
## Scenarios
```
msf > use auxiliary/scanner/winrm/winrm_cmd
msf auxiliary(scanner/winrm/winrm_cmd) > set CMD hostname
CMD => hostname
msf auxiliary(scanner/winrm/winrm_cmd) > set RHOSTS 1.1.1.10
RHOSTS => 1.1.1.10
msf auxiliary(scanner/winrm/winrm_cmd) > set USERNAME Administrator
USERNAME => Administrator
msf auxiliary(scanner/winrm/winrm_cmd) > set PASSWORD vagrant
PASSWORD => vagrant
msf auxiliary(scanner/winrm/winrm_cmd) > run
[+] vagrant-2008R2
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf auxiliary(scanner/winrm/winrm_cmd) >
```