Rezultati pretraživanja
  1. 21. tra 2018.

    trick for enabling RDP remotely: psexec \\dnsname-or-ip reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f

  2. 27. lip 2017.

    The sample contains 4 resources, all zlib compressed. 3 PE files. 3th is version 1.98 with valid signature.

  3. 19. srp 2018.

    Nice alternative to using from to escalate to SYSTEM with a Scheduled Task on a local or remote computer

  4. 9. stu 2018.

    one liner to get the full line to create a service from a packet capture because getting the info out was a PITA tshark -n -r powershell.pcap -Y svcctl.binarypathname -T fields -e svcctl.binarypathname

  5. 27. lip 2017.

    using and for lateral movement

  6. 11. lis 2019.

    To uninstall a product using you can do it via WMI/CIM in 1 line (better in 2 - query first & call if not null) (Get-WmiObject -Class win32_product -Filter "Name = 'ControlUpAgent'").UnInstall() Remote it with -ComputerName or with wmic.exe via

  7. 21. lip 2016.

    RemCom - Remote Command Executor: A OSS replacement for PsExec and RunAs

  8. 30. tra 2018.

    6 new free rules are out today to detect C2, RDP via and + attack for Microsoft Active Directory. All mapped to download here:

  9. 18. pro 2018.

    "Despite the wealth of lateral movement tools similar to PsExec, an evergreen tactic for detecting these tools is to hunt for outlying named pipes used by processes on your Windows endpoints," wrote on detecting and similar tools.

  10. 27. lip 2017.

    yet another huge attack? this time WMIC&PsExec? seems no exploit is needed to spread it world wide

  11. 14. ruj 2019.
    Odgovor korisniku/ci

    , , registry key for disabling Windows Defender, (too common to be sure), EICAR test string, registry key to make WDigest store password in RAM, command for

  12. Nightly rem when attackers use , it leaves breadcrumbs for Log: 1, 3, 13 Log: 4624, 4625, 4697, 7045 Pre(Super)Fetch/Amcache: Metadata of PsExecSvc.exe Key: HKEY_USERS[UserSID]\SOFTWARE\Sysinternals\PsExec\EulaAccepted

    Prikaži ovu nit
  13. 30. svi 2016.

    2/ Here are some screenshots of catching (Also starring: our handsome R&D manager)

  14. 13. lip 2017.

    I'm just saying that none of those tools (and half of our world) would be available w/o the 's

  15. 18. ruj 2019.

    Psexec: The Ultimate Guide by | Learn how to download psexec, launch a psexec remote cmd, cover psexec examples and how to use psexec and PowerShell together! Please RT if you like it!

  16. 30. svi 2014.

    New post on remoting: Psexec is Dead RTs are appreciated!

  17. 25. velj 2015.
    Odgovor korisniku/ci

    Most Popular Tools (by # of mentions in M-Trends 2015 report): 1. (25) 2. (10) 3. (7) 4. (6)

  18. 15. tra 2019.
  19. 12. sij 2015.
  20. Legacy remoting tech. ? Buuuuuuh .....

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.