psexec.py : https://github.com/CoreSecurity/impacket

smbexec.py. Another Impacket script. This one is a bit "stealthier" as it doesn't drop a binary on the target system. Commands and output are asynchronous:

wmiexec.py. Yet another awesome Impacket script. Under the hood this one uses Windows Management Instrumentation (WMI) to launch a semi-interactive shell.

CrackMapExec. You can also use CrackMapExec to execute commands on hosts by passing it the "-x" parameter. Since it's built on Impacket's libraries, it's basically doing the exact same thing as wmiexec.py, but let's you do it across a range of IPs:

Using Remote Desktop

rdp_check :to see if you have RDP access, then use Kali's

rdesktop :to connect:

psexec : https://technet.microsoft.com/en-us/sysinternals/bb842062.aspx

The service starts the binaryC:\Windows\PSEXECSVC.exe. That directory is actually the ADMIN$ share over SMB. So PsExec performs a few steps to get you a shell:

  1. Copy a binary to the ADMIN$ share over SMB
  2. Create a service on the remote maching pointing to the binary
  3. Remotely start the service
  4. When exited, stop the service and delete the binary

Wmis

results matching ""

    No results matching ""