snippetbashTip
nxc wmi — Pentest and exploit the Windows Management Instrumentation (WMI). More information: <https://www.net
Viewed 0 times
thecommandwindowsandexploitclinxc wmipentest
Problem
How to use the
nxc wmi command: Pentest and exploit the Windows Management Instrumentation (WMI). More information: <https://www.netexec.wiki/wmi-protocol/password-spraying>.Solution
nxc wmi — Pentest and exploit the Windows Management Instrumentation (WMI). More information: <https://www.netexec.wiki/wmi-protocol/password-spraying>.Search for valid credentials by trying out every combination in the specified lists of usernames and passwords:
nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}Authenticate via local authentication (as opposed to authenticating to the domain):
nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --local-authIssue the specified WMI query:
nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --wmi {{wmi_query}}Execute the specified command on the targeted host:
nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}Code Snippets
Search for valid credentials by trying out every combination in the specified lists of usernames and passwords
nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}Authenticate via local authentication (as opposed to authenticating to the domain)
nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --local-authIssue the specified WMI query
nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --wmi {{wmi_query}}Execute the specified command on the targeted host
nxc wmi {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} -x {{command}}Context
tldr-pages: common/nxc wmi
Revisions (0)
No revisions yet.