Description: In this technical webinar Devid Maloney talking about how you can exploit WinRM services using Metasploit Framework so what you will learn:
• Capabilities of Windows Remote Management (WinRM) and Windows Remote Shell (WinRS)
• Discovering hosts running these services
• Brute forcing the services to obtain passwords
• Running WMI Queries and running commands
• Getting and migrating shells to a more persistent process and more.
About David Maloney:
David Maloney, a Software Engineer on Rapid7's Metasploit team, is responsible for development of core features for the commercial Metasploit editions. Before Rapid7, he worked as a Security Engineer and Penetration Tester at Time Warner Cable and as an Application Security Specialist for a global insurance company. David has been a long-time community contributor to the Metasploit Framework. He is one of the founders of Hackerspace Charlotte and is an avid locksport enthusiast.
Tags: hacking , hack , winrm , metasploit-framework , talk , webinar ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.