Tags » Psexec

Quick Post: PSEXEC & WOL

Ever need to wake up a computer on a subnet that the “magic” packet can’t reach? Use PSEXEC to remote to a powered on computer on that subnet then run WOL. 21 more words


Running interactive powershell session as Local System account

In order to troubleshoot a process running as the Local System account, I was required to run a powershell session under the security context of this account. 34 more words


Uploading and Executing undetectable payload using PSEXEC Exploit

Last post explained about how to find windows share (SMB) credentials using brute-forcing method.

Today’s tutorial we going to upload and execute the undetectable payload to the victims machine using SMB credentials gotten from brute-force method. 746 more words