I’ve read here sometimes that people is having problems to connect using Evil-WinRM. Believe me, Evil-WinRM is written in ruby and it works like a charm on this machine. It needs only the right user and password combination. If it is not working is because you are not using the right user and password combination, that’s all. Beware of the symbol $ if you need to pass it as a parameter. Single quotes instead of double quotes is a good idea to avoid bash vars expansion.
What’s the path to the type 5 username? unable to find it!
Not sure what I did wrong for root but… when I grabbed the things, I either had nothing useful, or using the full option I got back far too much information (436 MB) that took a while to parse through.
After taking a step back, finally rooted it the intended way! Great new technique for my Windows Fu! Need to dig deeper on that one, wonder where else it might be applied and its limitations.
The user part is not very complicated, you just have to find a way to match the passwords to a specific user that you have to search for yourself. The root is also easy, the file to**.txt will be a clue for you, to go further.
Rooted, thank you for the nudges! It’s a simple box, I think the biggest frustration for me was the fact that it’s windows but I learned something, which is the main reason I’m here, so it was great
Could someone pm me a nudge for user. I’ve got the 3 passwords decrypted and tried to connect with the tools noted in this forum and none of it seems to work for me. I’ve tried all combinations of users and passwords