To connect from your attacking machine to a remote target machine using a local user account, you need to configure both sides (client and server) carefully because:
net user NewUser P@ssw0rd! /add
net localgroup Administrators NewUser /add
net localgroup "Remote Management Users" NewUser /add
winrm quickconfig -q
winrm set winrm/config/service/auth @{Basic="true"}
winrm set winrm/config/service @{AllowUnencrypted="true"}
netsh advfirewall firewall add rule name="WinRM HTTP" dir=in action=allow protocol=TCP localport=5985
winrm set winrm/config/client/auth @{Basic="true"}
winrm set winrm/config/client @{AllowUnencrypted="true"}
Replace RemoteComputerName
or IP address:
winrm set winrm/config/client @{TrustedHosts="RemoteComputerName"}
If you're unsure or testing many, you can allow all (not secure):
winrm set winrm/config/client @{TrustedHosts="*"}