mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-15 01:17:36 +00:00
GitBook: [master] one page modified
This commit is contained in:
parent
7d9c2e77ed
commit
28c92fde10
1 changed files with 3 additions and 3 deletions
|
@ -7,14 +7,14 @@ description: >-
|
|||
|
||||
## WinRM
|
||||
|
||||
[Windows Remote Management](https://msdn.microsoft.com/en-us/library/windows/desktop/aa384426%28v=vs.85%29.aspx) \(WinRM\) is a Microsoft protocol that allows remote management of Windows machines over HTTP\(S\) using SOAP. On the backend it's utilizing WMI, so you can think of it as an HTTP based API for WMI.
|
||||
[Windows Remote Management](https://msdn.microsoft.com/en-us/library/windows/desktop/aa384426%28v=vs.85%29.aspx) \(WinRM\) is a Microsoft protocol that **allows remote management of Windows machines** over HTTP\(S\) using SOAP. On the backend it's utilising WMI, so you can think of it as an HTTP based API for WMI.
|
||||
|
||||
If WinRM is enabled on the machine, it's trivial to remotely administer the machine from PowerShell. In fact, you can just drop in to a remote PowerShell session on the machine \(as if you were using SSH!\)
|
||||
|
||||
The easiest way to detect whether WinRM is available is by seeing if the port is opened. WinRM will listen on one of two ports:
|
||||
|
||||
* 5985/tcp \(HTTP\)
|
||||
* 5986/tcp \(HTTPS\)
|
||||
* **5985/tcp \(HTTP\)**
|
||||
* **5986/tcp \(HTTPS\)**
|
||||
|
||||
If one of these ports is open, WinRM is configured and you can try entering a remote session.
|
||||
|
||||
|
|
Loading…
Reference in a new issue