Tags » Psexec

Corelabs Impacket Scripts (Modded)

I made some changes to wmiexec.py script due to some anonyances I encountered during peneration tests.

The use case scenario for these modded scripts is that if the password contains special characters like @ or : and you can’t use it with the default wmiexec.py/psexec.py/smbexec.py scripts (maybe its just me who can’t figure out how to know how to use them :P) 212 more words

Penetration Testing

Reset sa password in MS SQL

If you have forgotten sa password and don’t have sysadmin rights, you can do the following:

  1. Download pstools (psexec) from http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx
  2. Start cmd with administrator  (run as administrator) and run this command: …
  3. 65 more words

Quick Post: PSEXEC & WOL

Ever need to wake up a computer on a subnet that the “magic” packet can’t reach? Use PSEXEC to remote to a powered on computer on that subnet then run WOL. 21 more words