Will the same configurations work for windows 10 and 11? I tried doing so but it did not work i.e. session is not being able to establish now when i checked I found that both the system have same hostname also what if i want to connect with another system which is remotely far since i have another aws instance whose hostname is not same but also it is deployed in different aws region
@Sneako-yu3tg5 ай бұрын
Thanks man
@Mechta252 Жыл бұрын
Hello. Please tell me regarding evil winrm that i found on yt video, if someone could install this program on his computer, does it mean that he just need to know my IP and windows pass and he can just connect with my PC without access? :( I saw in video that guy just writes ip and pass - and connects easily with PC remotely. I'm concerned about my security, does it mean that someone can just install this program and hack me without access? (just by IP and pass)? Or he need to do something else or have physical access to computer? Again, i'm talking about 'EVIL WINRM' that i found on KZbin video and i'm worried about my computer. So what to do to protect? I mean, if someone can just install this on his computer and then connect with me so easy just by pass and IP and password? Or no? Some videos show that guy needs to have physical access, some videos show that just it's straight forward process. whom to believe?
@powerofpowershell7918 Жыл бұрын
If a device is accessible over the network, having the user id and password exposed it is very much easy to get the device data.
@Mechta252 Жыл бұрын
@@powerofpowershell7918 still not clear. for example, what if i don't have dedicated ip, but no password on win 11 account, no uac, don't have remote accessibility. maybe hacker needs complete access before he can connect remotely? i just was surprised by a video because guy shows like "connect ip + password" and he logged in. maybe it's just a fake? if i don't have remote access ON, how is it possible?
@powerofpowershell7918 Жыл бұрын
@@Mechta252 There is a condition for access. First level of access is from network. If it open, half job done. Second if hacker know device credential, full job is done.