Sh11td0wn/winrm_kerb_shell
GitHub: Sh11td0wn/winrm_kerb_shell
基于 Kerberos 票据通过 WinRM 协议获取 Windows 主机交互式 Shell 的 Ruby 脚本。
Stars: 18 | Forks: 2
# winrm_kerb_shell
```
Description
Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine,
relaying on a valid Kerberos ticket. (Very useful with Golden Tickets)
### 注意 ###
Make sure you have your kerberos ticket properly configured,
either setting the KRB5CCNAME variable or copying and renaming it to '/tmp/krb5cc_0'
Example:
export KRB5CCNAME='/foo/bar/ticket.ccache'
or
cp -v /foo/bar/ticket.ccache /tmp/krb5cc_0
Also, make sure you can resolve all domain involved names.
Usage: ./winrm_kerb_shell.rb [options]
Example:
./winrm_kerb_shell.rb -s fooserver.contoso.com -r CONTOSO.COM
Obs. Options --server, and --realm are REQUIRED!
Options:
-h, --help Show this help message
-s, --server SERVER The server FQDN.
-r, --realm DOMAIN The realm name. (UPPERCASE)
*** Do NOT use this for illegal or malicious use ***
By running this, YOU are using this program at YOUR OWN RISK.
This software is provided "as is", WITHOUT ANY guarantees OR warranty.
```
标签:CCache, Conpot, CTF学习, HTTP, MIT Kerberos, Modbus, PE 加载器, TCP/5985, Terraform 安全, Windows安全, WinRM, 交互式Shell, 内网渗透, 凭证传递, 嗅探欺骗, 域环境, 安全测试, 攻击性安全, 权限维持, 横向移动, 编程规范, 远程命令执行, 黄金票据