I was working on HEIST and I used metasploit with module (/auxiliary/scanner/winrm/Winrm_login) . I used a user.txt and pass.txt to test all my findings. All of them was unsuccesful with Kali. I checked the walktrough and two users where ok. Even, the owner of the document used the same as me: metasploit. I created new Kali linux with same results. Finally I used the HTB box (parrot os) and local parrot VM and in both the results where as expected. Anybody experienced the same?