Windows Remote Management
Last updated
Last updated
The winrm
and winrm64
methods can be used for 32 and 64-bit targets as appropriate.
The SMB Beacon is an excellent choice when moving laterally, because the SMB protocol is used extensively in a Windows environment, so this traffic blends in very well.
WinRM will return a high integrity Beacon running as the user with which you're interacting with the remote machine as.
This new Beacon will be running inside wsmprovhost.exe
, which is the "Host process for WinRM plug-ins". This is used whenever WinRM is used, legitimate or otherwise. You can search for process start events, but this will produce a lot of false positives if WinRM is being used legitimately by system administrators.
The most likely means of identifying this lateral movement is by searching PowerShell script block logs for known payload artefacts.