Files
nuclei-templates/code/windows/audit/winrm-remote-shell-access-allowed.yaml
2024-10-24 13:54:16 +07:00

33 lines
756 B
YAML

id: winrm-remote-shell-access-allowed
info:
name: Remote Shell Access Allowed
author: princechaddha
severity: high
description: Checks if remote shell access via WinRM is allowed, which can be exploited.
impact: |
Remote shell access could allow unauthorized access to critical system components.
remediation: |
Disable remote shell access in WinRM.
tags: winrm,remote-shell,code,windows-audit
self-contained: true
code:
- pre-condition: |
IsWindows();
engine:
- powershell
- powershell.exe
args:
- -ExecutionPolicy
- Bypass
pattern: "*.ps1"
source: |
(Get-Item WSMan:\localhost\Shell).AllowRemoteShellAccess
matchers:
- type: word
words:
- "True"