WinRM: Exploitation with Metasploit

Lab Environment

In this lab environment, you will be provided with GUI access to a Kali machine. The target machine will be accessible at demo.ine.local.

Your task is to fingerprint the WinRM service using the tools available on the Kali machine and then exploit the vulnerability using the Metasploit framework exploit and auxiliary modules.

Objective: Exploit the WinRM service to get a meterpreter on the target and retrieve the flag!

Tools

  • Metasploit Framework

  • Nmap

Writeup

nmap -sSVC demo.ine.local

Metasploit

Alternativa

Last updated