Tags » Psexec

How to Hack Your Way into SQL Server

I work on a lot of different customer’s computers.  And once in a while I find a SQL Server that nobody knows the SA password and it is not in our database of passwords.  397 more words

Hack SQL Server

MS: Using PsExec to get a remote shell

We we were having remote login issues when trying to connect to a domain joined server, but even server manger was failing to provide us with any real option of administering this server. 142 more words

Microsoft Help

HOWTO: Set Logon as a Service Dynamically via GPO

I recently ran into a situation where a client has a group per server for Administrators, Remote Desktop Users, and hopefully, Service Accounts.  This may or may not be the best way of dealing with this, but it does solve a need by moving user access to AD vs configuration on local servers.  It’s a little easier to centralize and manage by administrators that may have access to AD but not the servers themselves (eg: HelpDesk users).  The problem, as indicated below, is that setting the rights for the service account/groups has been getting done manually to the systems as they are built or needed.  This has resulted in inconsistencies, as one might expect.  So I found a way to standardize and bring it all “back up to code”, as it were. 1,153 more words

AD

Remotely Install and Uninstall MSI applications silently

Hi All,

This time I will show you something I use rather often in my day life as well at me work too.
It is a very popular and old method for deploying applications and for sure it is not the best one. 348 more words

Windows Tips

Export current IIS worker process requests remotely

Hello friends,

(This article has been moved and improved on my self-hosted blog: http://tonybenev.tk/export-current-iis-worker-process-requests-remotely/)

At my regular job I often receive tasks that are very specific and solutions are rare. 247 more words

Windows Tips

Running in the name of...

During my last post I briefly discussed the issues related to the execution context of the chef-client when developing and testing cookbooks. To summarize: on a windows machine the chef-client runs under the context of the local system account, an account which basically is a local admin but has almost no permissions on other Active Directory joined/secured objects ( such as other machines, Active Directory itself or file shares). 421 more words

Active Directory

Start a batch file in interactive mode in SCCM Task Sequence

Start a batch file in interactive mode in SCCM Task Sequence.

psexec.exe -accepteula -s -i 1 -d C:\windows\temp\install.cmd

I use it for AutoIT scripts which need interaction. 12 more words

Script