Warning
By default, UAC restricts WinRM calls to domain admins and the default local “Administrator” account. Local Windows admins cannot call this service without first disabling UAC!
Tip
Admin-ish privileges (including privileges associated with the Backup Operators group) are stripped by default when using WinRM. To enable this access, we need to set the LocalAccountTokenFilterPolicy registry key to 1.
Windows Remote Management (WinRM) is basically PowerShell-over-HTTP. It requires access to TCP 5985 (unencrypted) or TCP 5986 (encrypted).
WinRS
winrs
winrs.exe is an older application used to interact with WinRM.
This interface has been largely deprecated in favor of using PowerShell, and may not even be present on recent versions of Windows.
Link to original
PowerShell
Use WinRM with PowerShell
Many large companies will enable PowerShell remoting on all machines in order to ease IT support burdens (by default, remoting is only enabled on domain controllers).
Link to original
Evil-WinRM
Evil-WinRM
This requires that you already have the target user’s NTLM hash, obviously.
Note that Evil-WinRM does have a built-in download command for transferring files, but it’s sloooow…
Link to original