During a penetration test, a team used Evil-WinRM to connect to a Windows server. They aim to run scripts and transfer files with minimal detection. Which method is recommended for achieving these tasks?
Enable a service to upload and execute scripts
Use the console’s interactive features for script execution and file handling
Forward commands through a raw TCP tunnel for remote processes
Switch to a protocol with key-based authentication for script execution
The option providing interactive session features for script execution and file management integrates well with the environment, allowing secure transfers and commands. Other options either rely on separate protocols that may not leverage the native framework or use a service that does not provide a robust approach to managing scripts and file transfers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Evil-WinRM and how does it work?
Open an interactive chat with Bash
Why is interactive script execution preferred during penetration testing?
Open an interactive chat with Bash
What security considerations are associated with using WinRM?