windows
ethical-hacking
smb
winrm
enumeration
Behind every Windows machine on a network, there are services that speak. Some speak loudly, like RDP, which displays full desktops. Others are more discreet, like SMB, which are limited to file sharing. But all of them, without exception, can become open doors if not properly configured. Today, you’ll approach a machine that will teach you just that—how to listen to those voices, how to discover what others have left exposed.
These machines have several services running. Let’s see what they are and why they matter.
In this lesson, the first thing you need to do is enumerate SMB. Because SMB remembers. If there are unprotected shared folders, you can see them from the outside, without needing to be a system user. You can use tools like smbclient
, smbmap
, enum4linux
, or even nmap
to explore those resources.
For example, using smbclient
:
1smbclient -L \\TARGET_IP\
1smbclient \\\\TARGET_IP\\share
Inside, you might find files like alice_creds.txt
and backup.zip
. The first file gives you something direct—a username and password. But the second, the .zip
, holds something deeper: a hash. That hash belongs to the Administrator account and gives you access to WinRM—and this is where a key tool comes in, evil-winrm
.
Evil-WinRM is a utility designed to connect you remotely to a Windows machine via port 5985
. But not as a simple user. It opens an interactive, practical remote PowerShell session from which you can move around the entire system.
The power of Evil-WinRM is that you can connect even if you don’t have the real password, as long as you have the user’s NTLM hash. And that’s exactly what you can find in this exercise.
The basic usage is:
1evil-winrm -i <IP> -u Administrator -H <NTLM_HASH>
From that moment, you’re inside, with full permissions and the ability to search, read, and execute. But remember, getting there isn’t by chance. It’s the result of a series of poor decisions: sharing files without control, storing credentials in plain text, not properly encrypting .zip
files, allowing authentication with hashes, and exposing remote services.
You’re seeing them from the outside, with the perspective of a learner. But many of these mistakes exist in real systems, with real data.