Remote Execution Techniques

Impacket tools

https://www.secureauth.com/labs/open-source-tools/impacket
# psexec
# PSEXEC like functionality example using RemComSvc(https://github.com/kavika13/RemCom).
psexec.py domain/user:password@IP <command>
# smbexec
# A similar approach to PSEXEC w/o using RemComSvc. The technique is described here. 
# Instantiating a local smbserver to receive the output of the commands. 
# This is useful in the situation where the target machine does NOT have a writeable share available.
smbexec.py domain/user:password@IP <command>
# atexec
# This example executes a command on the target machine through the Task Scheduler service and returns the output of the executed command.
atexec.py domain/user:password@IP <command>
# wmiexec
# A semi-interactive shell, used through Windows Management Instrumentation. 
# It does not require to install any service/agent at the target server. Runs as Administrator. Highly stealthy.
wmiexec.py domain/user:password@IP <command>
# dcomexec
# A semi-interactive shell similar to wmiexec.py, but using different DCOM endpoints. 
##  Currently supports MMC20.Application, ShellWindows and ShellBrowserWindow objects.
dcomexec.py domain/user:password@IP <comma

WinRM

Evil-WinRm

Last updated