IMPORTANT
By default, UAC restricts WinRM calls to domain admins and the default local “Administrator” account. Local Windows admins cannot call this service without first disabling UAC!
WARNING
Admin-ish privileges (including privileges associated with the Backup Operators group) are stripped by default when using WinRM. To enable this access, we need to set the LocalAccountTokenFilterPolicy registry key to 1.
Windows remote management
Windows Remote Management (WinRM) is basically PowerShell-over-HTTP. It requires access to TCP 5985 (unencrypted) or TCP 5986 (encrypted).
Link to original
WinRS
winrs
winrs.exe is an older application used to interact with WinRM.
This interface has been largely deprecated in favor of using PowerShell, and may not even be present on recent versions of Windows.
Link to original
PowerShell
How to use WinRM with PowerShell
Many large companies will enable PowerShell remoting on all machines in order to ease IT support burdens (by default, remoting is only enabled on domain controllers).
Link to original
Evil-WinRM
File transfers in Evil-WinRM
Evil-WinRM does have a built-in download command for transferring files, but it’s sloooow…
Link to original