From 6916b5664176dd30bb0d6761057518bb6b443c0a Mon Sep 17 00:00:00 2001 From: y_k_oo7 Date: Tue, 19 Feb 2019 19:10:28 +0530 Subject: [PATCH] Added auxiliary/scanner/winrm docs --- .../scanner/winrm/winrm_auth_methods.md | 23 +++++++++++++ .../auxiliary/scanner/winrm/winrm_cmd.md | 34 +++++++++++++++++++ 2 files changed, 57 insertions(+) create mode 100644 documentation/modules/auxiliary/scanner/winrm/winrm_auth_methods.md create mode 100644 documentation/modules/auxiliary/scanner/winrm/winrm_cmd.md diff --git a/documentation/modules/auxiliary/scanner/winrm/winrm_auth_methods.md b/documentation/modules/auxiliary/scanner/winrm/winrm_auth_methods.md new file mode 100644 index 0000000000..d6f2975bed --- /dev/null +++ b/documentation/modules/auxiliary/scanner/winrm/winrm_auth_methods.md @@ -0,0 +1,23 @@ +## Description +This module sends a request to an HTTP/HTTPS service to see if it is a WinRM service. If it is a WinRM service, it also gathers the Authentication Methods supported. + +## Verification Steps + +1. Do: ```use auxiliary/scanner/winrm/winrm_auth_methods +2. Do: ```set RHOSTS [IP]``` +3. Do: ```run``` + +## Scenarios + +``` +msf > use auxiliary/scanner/winrm/winrm_auth_methods +msf auxiliary(scanner/winrm/winrm_auth_methods) > set RHOSTS 1.1.1.10 +RHOSTS => 1.1.1.10 +msf auxiliary(scanner/winrm/winrm_auth_methods) > run + +[+] 1.1.1.10:5985: Negotiate protocol supported +[+] 1.1.1.10:5985: Basic protocol supported +[*] Scanned 1 of 1 hosts (100% complete) +[*] Auxiliary module execution completed +msf auxiliary(scanner/winrm/winrm_auth_methods) > +``` diff --git a/documentation/modules/auxiliary/scanner/winrm/winrm_cmd.md b/documentation/modules/auxiliary/scanner/winrm/winrm_cmd.md new file mode 100644 index 0000000000..cee7918fab --- /dev/null +++ b/documentation/modules/auxiliary/scanner/winrm/winrm_cmd.md @@ -0,0 +1,34 @@ +## Description +This module runs arbitrary Windows commands using the WinRM Service. It needs login credentials to do so. + +## Verification Steps + +1. Do: ```use auxiliary/scanner/winrm/winrm_cmd``` +2. Do: ```set CMD [WINDOWS COMMAND]``` +3. Do: ```set RHOSTS [IP]``` +4. Do: ```set USERNAME [USERNAME]``` +5. Do: ```set PASSWORD [PASSWORD]``` +6. Do: ```run``` + +## Scenarios + +``` +msf > use auxiliary/scanner/winrm/winrm_cmd +msf auxiliary(scanner/winrm/winrm_cmd) > set CMD hostname +CMD => hostname +msf auxiliary(scanner/winrm/winrm_cmd) > set RHOSTS 1.1.1.10 +RHOSTS => 1.1.1.10 +msf auxiliary(scanner/winrm/winrm_cmd) > set USERNAME Administrator +USERNAME => Administrator +msf auxiliary(scanner/winrm/winrm_cmd) > set PASSWORD vagrant +PASSWORD => vagrant +msf auxiliary(scanner/winrm/winrm_cmd) > run + +[+] vagrant-2008R2 + +[*] Scanned 1 of 1 hosts (100% complete) +[*] Auxiliary module execution completed + +msf auxiliary(scanner/winrm/winrm_cmd) > +``` +