Password Attacks Module: Network Services (winrm) Help

Hey, I’m having trouble with the Password Attacks Module (the Network Services portion) and was hoping I could get some guidance.

I’m trying to brute force the winrm username/password using the provided username.list and password.list files but I keep getting no results.

I’ve tried multiple times with both crackmapexec and netexec but nothing crops up. Is there another tool I could try? Or a different work list other than the ones provided.

1 Like

i am on the same section. a second ago successfully found a username and password. i used crackmapexec winrm (host) -u user.list -p pass.list.

replace user and pass with your filenames they provided in recources. However in the next step with xfreerdp im stuck with using the combo. Connection keeps being reset by peer

1 Like

jeez, i haven’t seen the resources… thank you <3