Sh11td0wn/winrm_kerb_shell

GitHub: Sh11td0wn/winrm_kerb_shell

基于 Kerberos 票据通过 WinRM 协议获取 Windows 主机交互式 Shell 的 Ruby 脚本。

Stars: 18 | Forks: 2

# winrm_kerb_shell ``` Description Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very useful with Golden Tickets) ### 注意 ### Make sure you have your kerberos ticket properly configured, either setting the KRB5CCNAME variable or copying and renaming it to '/tmp/krb5cc_0' Example: export KRB5CCNAME='/foo/bar/ticket.ccache' or cp -v /foo/bar/ticket.ccache /tmp/krb5cc_0 Also, make sure you can resolve all domain involved names. Usage: ./winrm_kerb_shell.rb [options] Example: ./winrm_kerb_shell.rb -s fooserver.contoso.com -r CONTOSO.COM Obs. Options --server, and --realm are REQUIRED! Options: -h, --help Show this help message -s, --server SERVER The server FQDN. -r, --realm DOMAIN The realm name. (UPPERCASE) *** Do NOT use this for illegal or malicious use *** By running this, YOU are using this program at YOUR OWN RISK. This software is provided "as is", WITHOUT ANY guarantees OR warranty. ```
标签:CCache, Conpot, CTF学习, HTTP, MIT Kerberos, Modbus, PE 加载器, TCP/5985, Terraform 安全, Windows安全, WinRM, 交互式Shell, 内网渗透, 凭证传递, 嗅探欺骗, 域环境, 安全测试, 攻击性安全, 权限维持, 横向移动, 编程规范, 远程命令执行, 黄金票据