POWERSHELL : WINRM,WS MAN and Managing Sessions

Sdílet
Vložit
  • čas přidán 12. 09. 2024
  • Starting with PowerShell 6.0 you can use Secure Shell (SSH) to establish a connection to and create a session on a remote computer, if SSH is available on the local computer and the remote computer is configured with a PowerShell SSH endpoint. The benefit of an SSH based PowerShell remote session is that it can work across multiple platforms (Windows, Linux, macOS). For SSH based sessions you use the HostName or SSHConnection parameter set to specify the remote computer and relevant connection information.

Komentáře • 8

  • @Sneako-yu3tg
    @Sneako-yu3tg Před 3 měsíci

    Thanks man

  • @testsubject7255
    @testsubject7255 Před rokem +1

    The hero we needed!

  • @edenannonay5390
    @edenannonay5390 Před 9 měsíci +1

    Absolutely beautiful !

  • @SOUMYAMITRA-ip9eq
    @SOUMYAMITRA-ip9eq Před 5 měsíci

    Will the same configurations work for windows 10 and 11?
    I tried doing so but it did not work i.e. session is not being able to establish
    now when i checked I found that both the system have same hostname
    also what if i want to connect with another system which is remotely far since i have another aws instance whose hostname is not same but also it is deployed in different aws region

  • @Mechta252
    @Mechta252 Před rokem

    Hello. Please tell me regarding evil winrm that i found on yt video, if someone could install this program on his computer, does it mean that he just need to know my IP and windows pass and he can just connect with my PC without access? :(
    I saw in video that guy just writes ip and pass - and connects easily with PC remotely.
    I'm concerned about my security, does it mean that someone can just install this program and hack me without access? (just by IP and pass)?
    Or he need to do something else or have physical access to computer?
    Again, i'm talking about 'EVIL WINRM' that i found on CZcams video and i'm worried about my computer. So what to do to protect?
    I mean, if someone can just install this on his computer and then connect with me so easy just by pass and IP and password? Or no?
    Some videos show that guy needs to have physical access, some videos show that just it's straight forward process. whom to believe?

    • @powerofpowershell7918
      @powerofpowershell7918  Před rokem

      If a device is accessible over the network, having the user id and password exposed it is very much easy to get the device data.

    • @Mechta252
      @Mechta252 Před rokem

      @@powerofpowershell7918 still not clear. for example, what if i don't have dedicated ip, but no password on win 11 account, no uac, don't have remote accessibility. maybe hacker needs complete access before he can connect remotely? i just was surprised by a video because guy shows like "connect ip + password" and he logged in. maybe it's just a fake? if i don't have remote access ON, how is it possible?

    • @powerofpowershell7918
      @powerofpowershell7918  Před rokem +1

      @@Mechta252 There is a condition for access. First level of access is from network. If it open, half job done. Second if hacker know device credential, full job is done.