Skip to content

Penetration Testing Lab

Offensive Techniques & Methodologies

  • Methodologies
    • Red Teaming
      • Credential Access
      • Persistence
  • Resources
    • Papers
      • Web Application
    • Presentations
      • Defcon
      • DerbyCon
      • Tools
    • Videos
      • BSides
      • Defcon
      • DerbyCon
      • Hack In Paris
  • Contact
    • About Us
Posted on May 15, 2018May 15, 2018

Metasploit – WinRM Code Execution

Unknown's avatar by Administrator.In .Leave a Comment on Metasploit – WinRM Code Execution

Leave a comment Cancel reply

Post navigation

Previous Previous post: Lateral Movement – WinRM

Support pentestlab.blog

Pentestlab.blog has a long term history in the offensive security space by delivering content for over a decade. Articles discussed in pentestlab.blog have been used by cyber security professionals and red teamers for their day to day job and by students and lecturers in academia. If you have benefit by the content all these years and you would like to support us on the maintenance costs please consider a donation.

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

£5.00
£15.00
£100.00
£5.00
£15.00
£100.00
£5.00
£15.00
£100.00

Or enter a custom amount

£

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly

Enter your email address to follow this blog and receive notifications of new articles by email.

Join 2,357 other subscribers

Supported by

VISIT MALDEV ACademy

Search Topic

Recent Posts

  • Web Browser Stored Credentials
  • Persistence – DLL Proxy Loading
  • Persistence – Explorer
  • Persistence – Visual Studio Code Extensions
  • AS-REP Roasting

Categories

  • Coding (10)
  • Exploitation Techniques (19)
  • External Submissions (3)
  • General Lab Notes (22)
  • Information Gathering (12)
  • Infrastructure (2)
  • Maintaining Access (4)
  • Mobile Pentesting (7)
  • Network Mapping (1)
  • Post Exploitation (13)
  • Red Team (132)
    • Credential Access (5)
    • Defense Evasion (22)
    • Domain Escalation (6)
    • Domain Persistence (4)
    • Initial Access (1)
    • Lateral Movement (3)
    • Man-in-the-middle (1)
    • Persistence (39)
    • Privilege Escalation (17)
  • Reviews (1)
  • Social Engineering (11)
  • Tools (7)
  • VoIP (4)
  • Web Application (14)
  • Wireless (2)
February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Aug    

Pen Test Lab Stats

  • 7,829,539 hits

Facebook Page

Facebook Page

Blog at WordPress.com.
  • Methodologies
    • Red Teaming
      • Credential Access
      • Persistence
  • Resources
    • Papers
      • Web Application
    • Presentations
      • Defcon
      • DerbyCon
      • Tools
    • Videos
      • BSides
      • Defcon
      • DerbyCon
      • Hack In Paris
  • Contact
    • About Us
  • Comment
  • Subscribe Subscribed
    • Penetration Testing Lab
    • Join 2,357 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Penetration Testing Lab
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar