Jump to content
Kwelwild

Abusing Windows Remote Management (Winrm) With Metasploit

Recommended Posts

Posted

Abusing Windows Remote Management (Winrm) With Metasploit

Description: In this technical webinar Devid Maloney talking about how you can exploit WinRM services using Metasploit Framework so what you will learn:

• Capabilities of Windows Remote Management (WinRM) and Windows Remote Shell (WinRS)

• Discovering hosts running these services

• Brute forcing the services to obtain passwords

• Running WMI Queries and running commands

• Getting and migrating shells to a more persistent process and more.

About David Maloney:

David Maloney, a Software Engineer on Rapid7's Metasploit team, is responsible for development of core features for the commercial Metasploit editions. Before Rapid7, he worked as a Security Engineer and Penetration Tester at Time Warner Cable and as an Application Security Specialist for a global insurance company. David has been a long-time community contributor to the Metasploit Framework. He is one of the founders of Hackerspace Charlotte and is an avid locksport enthusiast.

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.

Original Source:

Sursa: Abusing Windows Remote Management (Winrm) With Metasploit

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...