PsExec, WMIC, and other tools

PsExec is Microsoft's replacement for Telnet and can be downloaded from https://technet.microsoft.com/en-us/sysinternals/bb897553.aspx.

The PsExec module is normally utilized by attackers to obtain access to and communicate with the remote system on the network with valid credentials:

Originally, the executable was designed for system internals to troubleshoot any issues with the framework. The same can now be utilized by running the PsExec Metasploit module and performing remote options. This will open up a shell; testers can either enter their username and password or just pass the hash values, so there is no need to crack the password hashes to gain access to the system. Now, all the lateral movement can be performed if a single system is compromised on the network without the need for a password.

The following screenshot provides the Metasploit module of PsExec with valid credentials:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.236.139.73