[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#960731: ITP: evil-winrm -- Ultimate WinRM shell for hacking/pentesting

Package: wnpp
Severity: wishlist
Owner: Pedro Loami Barbosa dos Santos <pedro@loami.eng.br>

* Package name    : evil-winrm
  Version         : 2.3
  Upstream Author : Óscar Alfonso Díaz <oscar.alfonso.diaz@gmail.com>
* URL             : https://github.com/Hackplayers/evil-winrm
* License         : LGPL-3
  Programming Lang: ruby
  Description     : Ultimate WinRM shell for hacking/pentesting

 This shell is the ultimate WinRM shell for hacking/pentesting.
 WinRM (Windows Remote Management) is the Microsoft implementation of
 WS-Management Protocol. A standard SOAP based protocol that allows hardware
 and operating systems from different vendors to interoperate. Microsoft
 included it in their Operating Systems in order to make life easier to system
 This program can be used on any Microsoft Windows Servers with this feature
 enabled (usually at port 5985), of course only if you have credentials and
 permissions to use it. So it can be said that it could be used in a post-
 exploitation hacking/pentesting phase. The purpose of this program is to
 provide nice and easy-to-use features for hacking. It can be used with
 legitimate purposes by system administrators as well but the most of its
 features are focused on hacking/pentesting stuff.

 This program is really useful while performing penetration testing,
 security auditing, vulnerability analysis, or just playing at some CTF
 box. With a system credential in hand, accessing winrm is usually an initial 
 foothold for entering the machine and starting running commands,
 and for that evil-winrm is great. It also allows other things like,  
 uploading/downloading files, loading binaries/scripts in memory, using pass-the-hash,etc.

 It should be a great package to Debian as it's a great tool to
 a security professional to have on his/her machine.

 I intend to maintain this package mentored by a friend DD, although any suggestions or contributions will be welcome.  

Reply to: