course hero the psexec utility can be utilized to perform which of the following actions

by Malvina Padberg 7 min read

How does psexec work?

What does psexec do?

How to use psexec command prompt?

Why is PsExec a dangerous file?

What does combining c, u, and p do?

How to extract files from pstools.zip?

Can you use psexec to run a process on a remote computer?

See 4 more

About this website

Using PsExec to open a Remote Command Prompt - Akril.net

That’s simple. I’m connected to my remote computer with an administrator command prompt. You can enter the commands that you want. Obviously, you can replace the hostname parameter by the IP of the remote computer.

How to run programs remotely using PsExec - Jonathan Crozier

Have you ever wanted to run a program remotely across a network without needing to install or configure anything on the remote machine you wish to access? If the answer is yes then you’ll be pleased to know there is a way to accomplish this in a Windows environment using a very clever little command-line...

How to install an .exe remotely with psexec?

This is going to be a long one with lots of links since an exe is just a wrapper. Did some digging and found this older Spiceworks article so you don't have to do all the testing yourself. It has links out to Orca and such. You should make this easier on yourself and just use PDQ Deploy or Chocolatey.They are designed to do exactly what you're wanting.

What is PsExec?

The PsExec utility was designed as part of the PsTools suite, originally developed by Mark Russinovich of Sysinternals, now owned by Microsoft. The tool is coined as a command line based remote administration tool and allows for the remote execution of processes on other systems. It is very flexible in that it will allow for the use of alternate authentication credentials rather than those of the user executing it, meaning you can manage devices separated by domain and site boundaries. Not only can PsExec execute programs on a remote system, but it can also redirect console input and output between systems so that you can use interactive tools remotely.

Can psexec be used remotely?

Not only can PsExec execute programs on a remote system, but it can also redirect console input and output between systems so that you can use interactive tools remotely. Unlike most Microsoft associated software, the inner workings of PsExec are no secret and are fairly straightforward. PsExec allows redirects of the input and output ...

Does PsExec work on Windows?

If you are doing a penetration test on a Windows system and PsExec isn't working as it should be then chances are you are getting blocked by antivirus, and worse yet, you may be letting the end user know you are toying with their system.

Is PsExec the best tool?

Credentials in the clear - If you are concerned about who might be listening in on your network activity then PsExec is probably not the best tool to use. PsExec transmits all user credentials supplied to it in the clear, meaning that if you supply a username and password to access a system remotely, anybody with a copy of Wireshark or Tcpdump running can intercept the credentials.

Is PsExec included in Metasploit?

PsExec and Metasploit - When possible I never use PsExec by itself anymore. A modified version of PsExec is now included in the Metasploit Framework. Metasploit is a penetration testing framework that provides quite a bit of functionality. If you want to use PsExec for some form of security assessment then considering looking into the added functionality Metasploit provides with it. I actually used this version of PsExec in an article I wrote earlier on Passing the Hash techniques.

How does psexec work?

Much like any command-line tool, PsExec works only when its syntax is followed exactly. Once you understand how to type commands in the way the tool understands them, you can control the program from any Command Prompt.

What does psexec do?

Directs PsExec to run the application on the remote computer (s) specified. If omitted, PsExec runs the application on the local system, and if a wildcard ( \*) is specified, PsExec runs the command on all computers in the current domain.

How to use psexec command prompt?

One of the easiest ways to use PsExec to run Command Prompt commands on a remote computer is to execute cmd following the machine’s IP address, 192.168.86.62 in this example.

Why is PsExec a dangerous file?

The reason this happens is because malware has been known to use PsExec to transfer viruses.

What does combining c, u, and p do?

For example, combining -c, -u, and -p, specifically will let anyone with a network connection to your computer, and knowledge of the admin credentials, execute secret malware with anyone's credentials.

How to extract files from pstools.zip?

Extract the files from the PsTools.zip download. You can do that by right-clicking the ZIP file and selecting Extract All. Any third-party file extractor will work, too.

Can you use psexec to run a process on a remote computer?

You can use PsExec to not only manage processes on the remote computer but also redirect an application’s console output to your local computer, making it appear as though the process is running locally.

What parameters does psexec require?

At its most basic, PsExec requires two parameters: a computer name and a command to run. If you have a command to run on the remote computer that doesn’t require any arguments like hostname, you can simply add it after the computer name.

What is PsExec.exe?

If you’re new to IT or perhaps haven’t had the need to run commands and tools on remote computers , you might not know what psexec is.

What is psexec in Active Directory?

PsExec will search your entire Active Directory domain and attempt to run a command on every computer. Below is example syntax on how PsExec will attempt to connect to every computer on the domain the executing computer is a part of and run the hostname command.

How to run commands on multiple computers?

Another way you can run commands on multiple computers at once is to use a text file. Using the syntax @<filename.txt>, PsExec will read every line in the text file as if it were a computer name. It will then process each computer individually.

What utility can compete with Robocopy?

If there was a command-line utility that could compete with robocopy in terms of usefulness, it’s PsExec. The Sysinternals PsExec utility is as ubiquitous as they come in an IT admin arsenal. This tool allows administrators to remotely run commands just as if they were on the local computer.

What is the switch for psexec?

One of the most useful features of running PsExec under an alternative account is using the -s switch. This switch allows PsExec (and your remotely-executed application) to run under the remote (or local) computer’s LOCAL SYSTEM account.

What is the -u switch?

Using the -u and optional -p switch allows you to connect to the remote computer with an alternative user account. PsExec will then encrypt both the username and password and send them to the remote computer for authentication.

What is a psexec?

PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.

What is psexec in sysinternals?

PsExec is part of a growing kit of Sysinternals command-line tools that aid in the administration of local and remote systems named PsTools.

Do PsTools have viruses?

Note: some anti-virus scanners report that one or more of the tools are infected with a "remote admin" virus. None of the PsTools contain viruses, but they have been used by viruses, which is why they trigger virus notifications.

How to run psexec?

The Current User PSExec module is a local exploit. This means it is an exploit run on an already established session. Let's set up a scenario to explain how this works. In our scenario you do the following: 1 Set up a browser exploit at some address 2 Trick a local system administrator to visiting the site 3 Get a reverse Meterpreter shell, inside the administrator's browser process 4 Run netstat to see if the administrator is connected to one of the Domain controllers

Why is PSExec called PSExec?

The name PSExec comes from a program by the same name. Mark Russinovich wrote this utility as part of his sysInternals suite in the late 90s to help Windows Administrators perform important tasks, for example to execute commands or run executables on remote systems.

How is service exe generated?

The service EXE is generated using an executable template with a placeholder where the shellcode is inserted . The default executable templates in Metasploit Framework are flagged by major AV solutions because most anti-virus vendors have signatures for detecting these templates. No matter what payload you stick in this executable template, it will get flagged by AV.

How does a PSExec exploit work?

In this method, the exploit generates and embeds a payload into an executable, which is a Service image uploaded by the PSExec utility – similar to the PSExec service. The exploit then uploads the service executable to the Admin$ share using the supplied credentials, connects to the DCE/RPC interface, and calls into the Service Control Manager before telling SCM to start the service that we deployed to Admin$ earlier. When the service is started, it starts a new rundll32.exe process, allocates executable memory inside that process and copies the shellcode into it. It then calls the starting address of that memory location as if it were a function pointer, executing the stored shellcode.

What is psexec service?

It then uses the DCE/RPC interface over SMB to access the Windows Service Control Manager API. It turns on the PSExec service on the remote machine. The PSExec service then creates a named pipe that can be used to send commands to the system.

Can you write an entire executable?

In addition to writing a custom executable template, you can write an entire executable on your own. This means that a Metasploit payload will not actually get inserted. You will code the entire behavior into the EXE itself. The psexec exploit module will then upload the EXE and try to start it via SCM.

Is Service EXE caught by AV vendors?

Service EXE is now getting caught by most AV vendors. Use custom templates or MOF upload method to circumvent AV detection.

What Is PsExec?

PsExec is a versatile system administrative tool from Microsoft that you can use to remotely access a target host. The utility tool is part of Sysinternals Suites created by Mark Russinovich. Its main purpose is to help system administrators perform remote maintenance tasks and execute commands on the target host. As a command-line interface, PsExec only requires you to provide the target address, user detail, and password to gain access to the targeted computer.

What is psexec command?

PsExec is a utility tool that allows system administrators to control a computer from a remote location. It’s a command-line interface that requires no software installation like some of the popular remote administrative tools. You’re definitely wondering how this is possible, right?

What is ccleaner script?

The above script is used to install CCleaner on the remote computer Desktop7743. The Syntax -c is a command used for copying the CCleaner program from the local host to the remote computer while the CMD is for launching command prompt, and /S is a command used for enabling a silent install for the CCleaner.

How to connect to a remote host using psexec?

For PsExec to run and connect to a remote host, there are three basic prerequisites you’d need to put in place. These are: 1. Turn on File and Printer Sharing. File and Printer Sharing must be enabled on both the local and remote host. To enable File and Printer Sharing, open Windows Settings > Network & Internet and scroll to Network ...

How to extract pstool.zip?

After downloading, extract PsTool.zip. To do this, right click on the ZIP file and select Extract All from the menu.

What happens if inputted command successfully executes on remote system?

If your inputted command successfully executes on the remote system, it will transfer the text output to your command window.

Is psexec intimidating?

PsExec can seem intimidating. But, the more you interact with the command-line interface, the more proficient you will be with it. If you’re eager to go deeper and get familiar with the syntax and commands used for executing PsExec operations, you should learn more about the Windows command-line interface.

How does psexec work?

Much like any command-line tool, PsExec works only when its syntax is followed exactly. Once you understand how to type commands in the way the tool understands them, you can control the program from any Command Prompt.

What does psexec do?

Directs PsExec to run the application on the remote computer (s) specified. If omitted, PsExec runs the application on the local system, and if a wildcard ( \*) is specified, PsExec runs the command on all computers in the current domain.

How to use psexec command prompt?

One of the easiest ways to use PsExec to run Command Prompt commands on a remote computer is to execute cmd following the machine’s IP address, 192.168.86.62 in this example.

Why is PsExec a dangerous file?

The reason this happens is because malware has been known to use PsExec to transfer viruses.

What does combining c, u, and p do?

For example, combining -c, -u, and -p, specifically will let anyone with a network connection to your computer, and knowledge of the admin credentials, execute secret malware with anyone's credentials.

How to extract files from pstools.zip?

Extract the files from the PsTools.zip download. You can do that by right-clicking the ZIP file and selecting Extract All. Any third-party file extractor will work, too.

Can you use psexec to run a process on a remote computer?

You can use PsExec to not only manage processes on the remote computer but also redirect an application’s console output to your local computer, making it appear as though the process is running locally.

image