Windows Remote Management (WinRM) is the Microsoft implementation of WS-Management Protocol, a standard Simple Object Access Protocol (SOAP)-based. Usually run on port 5985.

Info

WinRM uses the PSRemoting (PowerShell remote) to login to a host and execute commands.

You can enable WinRM by running Enable-PSRemoting

By default WinRM uses port 5985 for sending traffic over HTTP (But it's still encrypted), and port 5986 for SSL.

If you can make a HTTP request (GET) to /wsman and you get 200 back, WinRM is enabled (on port 5985).

Add User to winrm group

net localgroup "Remote Management Users" /add bowen

Bruteforce login

Metasploit

The winrm_login module is a standard Metasploit login scanner to bruteforce passwords.

use auxiliary/scanner/winrm/winrm_login

Crackmapexec

cme winrm 192.168.1.0/24 -u userfile -p passwordfile

Login from windows

Powershell

From a powershell command prompt:

$pass = ConvertTo-SecureString 'supersecurepassword' -AsPlainText -Force 
$cred = New-Object System.Management.Automation.PSCredential ('ECORP.local\\morph3', $pass) 
Invoke-Command -ComputerName DC -Credential $cred -ScriptBlock { whoami }