I was working on HEIST and I used metasploit with module (/auxiliary/scanner/winrm/Winrm_login) . I used a user.txt and pass.txt to test all my findings. All of them was unsuccesful with Kali. I checked the walktrough and two users where ok. Even, the owner of the document used the same as me: metasploit. I created new Kali linux with same results. Finally I used the HTB box (parrot os) and local parrot VM and in both the results where as expected. Anybody experienced the same?
Always happy to help you. Don't forget to give me respect.
Click here to access my profile.
Discord user: darvidor#2989