WinRM
Installation
Install NetExec.
Usage
netexec winrm [-h] [--version] [-t THREADS] [--timeout TIMEOUT] [--jitter INTERVAL] [--no-progress] [--log LOG] [--verbose | --debug] [-6] [--dns-server DNS_SERVER] [--dns-tcp]
[--dns-timeout DNS_TIMEOUT] [-u USERNAME [USERNAME ...]] [-p PASSWORD [PASSWORD ...]] [-id CRED_ID [CRED_ID ...]] [--ignore-pw-decoding] [--no-bruteforce] [--continue-on-success]
[--gfail-limit LIMIT] [--ufail-limit LIMIT] [--fail-limit LIMIT] [-k] [--use-kcache] [--aesKey AESKEY [AESKEY ...]] [--kdcHost KDCHOST] [--pfx-cert PFXCERT] [--pfx-base64 PFXB64]
[--pfx-pass PFXPASS] [--pem-cert PEMCERT] [--pem-key PEMKEY] [-M MODULE] [-o MODULE_OPTION [MODULE_OPTION ...]] [-L [LIST_MODULES]] [--options] [-H HASH [HASH ...]]
[--port PORT [PORT ...]] [--check-proto CHECK_PROTO [CHECK_PROTO ...]] [--laps [LAPS]] [--http-timeout HTTP_TIMEOUT] [-d DOMAIN | --local-auth] [--dump-method {cmd,powershell}] [--sam]
[--lsa] [--dpapi] [--codec CODEC] [--no-output] [-x COMMAND] [-X PS_COMMAND]
target [target ...]Flags
positional arguments:
target the target IP(s), range(s), CIDR(s), hostname(s), FQDN(s), file(s) containing a list of targets, NMap XML or .Nessus file(s)
options:
-h, --help show this help message and exit
-H, --hash HASH [HASH ...]
NTLM hash(es) or file(s) containing NTLM hashes
--port PORT [PORT ...]
WinRM port - format: 'http-port https-port' (with space separated) or 'single-port' (http & https will use same port when given single port) (default: ['5985', '5986'])
--check-proto CHECK_PROTO [CHECK_PROTO ...]
Choose what protocol you want to check - format: 'http https' (with space separated) or 'single-protocol' (default: ['http', 'https'])
--laps [LAPS] LAPS authentication
--http-timeout HTTP_TIMEOUT
HTTP timeout for WinRM connections (default: 10)
-d DOMAIN domain to authenticate to
--local-auth authenticate locally to each target
Generic Options:
--version Display nxc version
-t, --threads THREADS
set how many concurrent threads to use (default: 256)
--timeout TIMEOUT max timeout in seconds of each thread
--jitter INTERVAL sets a random delay between each authentication
Output Options:
--no-progress do not displaying progress bar during scan
--log LOG export result into a custom file
--verbose enable verbose output
--debug enable debug level information
DNS:
-6 Enable force IPv6
--dns-server DNS_SERVER
Specify DNS server (default: Use hosts file & System DNS)
--dns-tcp Use TCP instead of UDP for DNS queries
--dns-timeout DNS_TIMEOUT
DNS query timeout in seconds (default: 3)
Authentication:
-u, --username USERNAME [USERNAME ...]
username(s) or file(s) containing usernames
-p, --password PASSWORD [PASSWORD ...]
password(s) or file(s) containing passwords
-id CRED_ID [CRED_ID ...]
database credential ID(s) to use for authentication
--ignore-pw-decoding Ignore non UTF-8 characters when decoding the password file
--no-bruteforce No spray when using file for username and password (user1 => password1, user2 => password2)
--continue-on-success
continues authentication attempts even after successes
--gfail-limit LIMIT max number of global failed login attempts
--ufail-limit LIMIT max number of failed login attempts per username
--fail-limit LIMIT max number of failed login attempts per host
Kerberos Authentication:
-k, --kerberos Use Kerberos authentication
--use-kcache Use Kerberos authentication from ccache file (KRB5CCNAME)
--aesKey AESKEY [AESKEY ...]
AES key to use for Kerberos Authentication (128 or 256 bits)
--kdcHost KDCHOST FQDN of the domain controller. If omitted it will use the domain part (FQDN) specified in the target parameter
Certificate Authentication:
--pfx-cert PFXCERT Use certificate authentication from pfx file .pfx
--pfx-base64 PFXB64 Use certificate authentication from pfx file encoded in base64
--pfx-pass PFXPASS Password of the pfx certificate
--pem-cert PEMCERT Use certificate authentication from PEM file
--pem-key PEMKEY Private key for the PEM format
Modules:
-M, --module MODULE module to use
-o MODULE_OPTION [MODULE_OPTION ...]
module options
-L, --list-modules [LIST_MODULES]
list available modules
--options display module options
Credential Gathering:
--dump-method {cmd,powershell}
Select shell type in hashes dump for sam or lsa (default: cmd)
--sam dump SAM hashes from target systems
--lsa dump LSA secrets from target systems
--dpapi dump user's Credential Manager secrets from target systems
Command Execution:
--codec CODEC Set encoding used (codec) from the target's output. If errors are detected, run chcp.com at the target & map the result with https://docs.python.org/3/library/codecs.html#standard-
encodings and then execute again with --codec and the corresponding codec (default: utf-8)
--no-output do not retrieve command output
-x COMMAND execute the specified command
-X PS_COMMAND execute the specified PowerShell commandModules
LOW PRIVILEGE MODULES
CREDENTIAL_DUMPING
[*] aws-credentials Search for aws credentials files.
HIGH PRIVILEGE MODULES (requires admin privs)
CREDENTIAL_DUMPING
[*] ntds-dump-raw Extracting the ntds.dit, SAM, and SYSTEM files from DC by accessing the raw hard drive.