Тёмный

Psexec.exe: A Powerful tool for IT Admins 

TechsavvyProductions
Подписаться 69 тыс.
Просмотров 101 тыс.
50% 1

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 140   
@rory_rox
@rory_rox Год назад
Was a sysadmin for years before I became familiar with PSExec.exe and boy it is such a game changer. Everyone in IT should be familiar with how to use it. Be careful however, always remember the more powerful the tool, the more respect you need to give it. Think carefully before you hit that big enter key.
@TechsavvyProductions
@TechsavvyProductions Год назад
LOL You are so right!
@SlothMcLazy
@SlothMcLazy 8 месяцев назад
One of the best tutorials I have seen on RU-vid. Thank you!
@TechsavvyProductions
@TechsavvyProductions 8 месяцев назад
Thanks for the comment!
@salvadorrobledo9419
@salvadorrobledo9419 2 года назад
Been watching your videos for years. Thank you for going in depth with this tool as I use it but now have a better understanding of it and learned so many new things it can do. I Appreciate all the great content 👌
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thank you for watching!
@certisfoster9716
@certisfoster9716 2 года назад
The biblical verses is just icing on the cake Mr. V 🍻. All your content is superb.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Glad you enjoy it!
@default19in
@default19in 2 года назад
There is one tool called batchpatch which uses this same psexec service and help to install everything in network. TX for depth knowledge sirjee.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for sharing!
@TheAlexkidx
@TheAlexkidx 2 года назад
Essa foi uma das aulas mais úteis que já assistí aqui, parabéns pelo seu conteúdo.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Obrigado por seus comentários e por acompanhar o canal!
@andytheunico
@andytheunico 2 года назад
Desde Perú, excelente guía. From Peru, useful guide!!
@TechsavvyProductions
@TechsavvyProductions 2 года назад
¡Gracias por el comentario y por mirar!
@frymc5351
@frymc5351 2 года назад
One of my new favorite lessons on this channel. Thank you for this video.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Awesome, I enjoyed doing the video. Always glad to hear a good feedback.
@luismarrero9293
@luismarrero9293 2 года назад
great tutorial thank you so much. one question do we need to do a configuration on the remote computer in order to work? like installing psexec or something else. in addition to probably have the print sharing port enable
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for the comment!
@malcolmmoore9938
@malcolmmoore9938 2 года назад
Mark Russinovich recommended your video 😉
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Malcolm, thanks but he doesn't know I exist. : )
@mikemurray2875
@mikemurray2875 2 года назад
Thanks for filling us in on how hackers do things :-)
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Mike just keep your admin credentials secure and I promise they will not use them.
@AustinHypes
@AustinHypes 5 месяцев назад
Great video, this is very weaponizable!!!
@TechsavvyProductions
@TechsavvyProductions 5 месяцев назад
Keep in mind if basic security is compromised all tools can be weaponized. It is a fantastic tool for admins as is PowerShell.
@JohnJohn-sf1df
@JohnJohn-sf1df 2 года назад
Fantastic. Just found your channel. Subbed!
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Welcome aboard!
@luismarrero9293
@luismarrero9293 Год назад
hello there great video very interesting theme . I wonder if we must use always Admnistrator system user or we can work with a local admin account too.????
@TechsavvyProductions
@TechsavvyProductions Год назад
Luis, yes you can use local admin also.
@luismarrero9293
@luismarrero9293 Год назад
@@TechsavvyProductions i tried but it didn't work for me . I have error you need to enable admin$ share on this computer
@efmece
@efmece 2 года назад
why would you use Psexec rather than Powershell? AFAIK powershell is more secured and uses really well windows API (powershell was created by microsoft). Its also native in all kind of windows. And if you want to connect to a remote machine (Enter-PSsesion can do it) and Invoke-command can run scripts to many systems parallely I just want to understand why psexec?
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Efrain, you are correct PowerShell is the tool for Enterprise! The video was simply explaining how to use it and how it works. It still can be a useful tool for many. Cheers!
@GooogleGoglee
@GooogleGoglee 2 года назад
Beautiful video and insight of psexec thank you Does the concept of the sessions apply also to Linux/Unix systems? Do they have 3 session total too in the same way? Thank you
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Great question: I am not as sure of the GUI architecture in Linux as I am in Windows. I will look and see if anyone does a comparison.
@NotThatEpic7492
@NotThatEpic7492 Год назад
it isnt necessarily 3 sessions, esch user who logs in will have another session created for them. for example: session 0 is created on boot and when the normal user logs in, session 1 is created for thet user. when someone connects with RDC, session 2 is created for it. lets say a second user logs into the computer (e.g. a family member), they would get session 3
@NotThatEpic7492
@NotThatEpic7492 Год назад
and so on…
@r3tr0n17
@r3tr0n17 Год назад
Excellent tutorial.. Thanks !
@TechsavvyProductions
@TechsavvyProductions Год назад
Thanks for watching!
@MsErmess
@MsErmess 2 года назад
Thanks a lot, brilliantly explained. Very educative.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Glad it was helpful!
@jonathansantiago8438
@jonathansantiago8438 6 месяцев назад
Great Tutorial, Thank you.
@TechsavvyProductions
@TechsavvyProductions 6 месяцев назад
Thanks for watching!
@ahirnimesh09
@ahirnimesh09 2 года назад
thank you making such curical topic video, your videos are useful for us who is working as sysadmin.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
It's my pleasure
@yagneshmalaviya5169
@yagneshmalaviya5169 2 года назад
Hats off. Great content great editing Thank you for investing time in creating this video.. bless you 🙌 🙌
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching!
@andreigiubleanu
@andreigiubleanu 2 года назад
LV is the man!
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thank you for watching!
@Silvermist78
@Silvermist78 Год назад
Sir you are awesome! 🙏🙏🙏🙏👏
@TechsavvyProductions
@TechsavvyProductions Год назад
Thanks for watching!
@vtreanor
@vtreanor 2 года назад
Great delivery but I've got no use for the flash bang intro stuff. Content was impressive.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for the comment and honest feedback!
@henrytongunclement2098
@henrytongunclement2098 2 года назад
Great tool I like it plus your presentation is super straight forward. Thanks
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching!
@aristotelesfernando
@aristotelesfernando 2 года назад
I never hear about that channel! awesome!
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching.
@RossCanpolat
@RossCanpolat 2 года назад
So for example with the VLC install if you did not specify a silent install would you have seen the VLC installer appear on your local machine where you scroll through the licence agreement and hit next several times to install it on the remote machine? Or is that type of remote install only capable over a GUI like remote desktop, teamviewer etc?
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Ross, this a console tool so no GUI that is why we want a silent install. If you using RDC or Teamviewer then you are thinking correctly but then must select the proper "session" if you want to interact with the install. Great questions!
@RossCanpolat
@RossCanpolat 2 года назад
@@TechsavvyProductions so what would have happened if you didn't select "silent" and just ran the installer while still being within the "session 0" mode? Would the user have seen a GUI installer pop up & would you would have been presented with installation options like agreeing to the EULA, choosing the installation directory etc via your shell prompt?
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Keep in mind Session 0 is where protected processes and services are run and the logged on user can not interact with them. You must select a session that the user can view {logged on with keyboard Session 1} {RDC or virtual machine Session 2}
@hadibq
@hadibq 2 года назад
nice discovery! new sub indeed! TY!
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Welcome!!!
@KristenWieland
@KristenWieland Год назад
You, sir, are amazing
@TechsavvyProductions
@TechsavvyProductions Год назад
Thanks for watching!
@AshraRai
@AshraRai 2 года назад
This is very useful lesson on brilliant tool. Thank you sir.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching!!
@ahmedsalaheldin6275
@ahmedsalaheldin6275 2 года назад
My favorite Channel 💪💪💪💪
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching!!!
@Sh3mboyTV
@Sh3mboyTV 2 месяца назад
❤ thank you so much 🙏😊❤
@TechsavvyProductions
@TechsavvyProductions 2 месяца назад
Thank you for watching!
@collinsonyegbado309
@collinsonyegbado309 Месяц назад
thanks a lot for your video. I have an issue. I created a user say user1.I made this user1 a member of an administrator in the remote machine. when i try to execute psexec using user1,i get "access denied".On the local machine,it is working but does not work on the remote machine.i have made use of the Administrator built in account but no luck
@TechsavvyProductions
@TechsavvyProductions Месяц назад
Step 1: Check UAC (User Account Control) on the Remote Machine Disable UAC Remote Restrictions: Even though the user is part of the administrators group, UAC can still restrict remote access for administrative tasks. Modify the following registry key on the remote machine: Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Find or create a DWORD named LocalAccountTokenFilterPolicy Set the value to 1 to disable UAC remote restrictions. Step 2: Verify User1's Administrative Rights Double-check user1’s rights: Ensure that user1 is correctly added to the administrators group on the remote machine. Sometimes changes in user permissions do not take effect until the user logs off and back on. You can do this by running net localgroup administrators on the remote machine to confirm. Step 3: Enable Remote UAC Filter Bypass Ensure that user1 has the necessary remote rights to execute commands. Try running gpedit.msc on the remote machine and checking the following: Under Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment, make sure that user1 has the “Allow log on locally” and “Log on as a batch job” rights. Step 4: Check for Network Policies or Firewalls Ensure the firewall is not blocking: Confirm that psexec is not being blocked by a firewall on the remote machine. You may need to open ports such as 445 (SMB) for remote execution. Step 5: Use Correct psexec Syntax Ensure you are running the correct syntax for psexec. Use the following format: psexec.exe \ emote-machine -u user1 -p password cmd Make sure the username and password for user1 are entered correctly. Step 6: SMB and Administrative Share Access Confirm that administrative shares (like C$) are accessible for user1. You can test this by manually accessing the share: Open \ emote-machine\C$ from the local machine. If access is denied here, the issue may be related to SMB permissions. Step 7: Ensure the Remote Machine's Built-in Admin Account is Enabled Even if user1 is an administrator, some systems have restrictions on non-built-in admin accounts. Try enabling and using the built-in Administrator account on the remote machine: net user administrator /active:yes Step 8: Use Elevated Command Prompt Make sure that when you are launching psexec, you are using an elevated command prompt (right-click cmd and "Run as Administrator") on your local machine.
@collinsonyegbado309
@collinsonyegbado309 Месяц назад
@@TechsavvyProductions.I have made success using the user1. Thanks so much for your swift response. I have attempted all the steps. I performed other steps like enabling windows remote management (it was disabled before ).I also added the user as a log on for a service. I will document the above steps to be used for another pc . Thank you so much
@GuNdEiGuRkE
@GuNdEiGuRkE Год назад
Hey somehow I have a weird error: When running 'psexec \\IP-Address -siu Administrator cmd' I get the cmd on my machine, but when I want the cmd to pop up on the remote machine, I run the same command you did in the video so 'psexec \\IP-Address -s -i 2 -u Administrator cmd' i get 'access denied - psexec could not start cmd on 'IP-Address'' do you have an idea what this is about and how to solve this?
@TechsavvyProductions
@TechsavvyProductions Год назад
Make sure your Administrator account is not disabled
@Bigjunk9999
@Bigjunk9999 11 месяцев назад
IS there any workaround to getting PSEXEC to be able to speak with workstations that have had their Admin$ share disabled? I'm hitting in impasse with this at work.
@TechsavvyProductions
@TechsavvyProductions 11 месяцев назад
It is rare to find Enterprises disabling Admin$, no it is a requirement for PSEXEC.
@Bigjunk9999
@Bigjunk9999 11 месяцев назад
Thanks for confirming. And great video!
@ajaidx
@ajaidx Год назад
Thanks a lot MR.V
@TechsavvyProductions
@TechsavvyProductions Год назад
Thanks for watching!
@pawansmy1844
@pawansmy1844 2 года назад
Much thanks for beautiful explanation
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for the comment.
@samiyanes1598
@samiyanes1598 2 года назад
THANK YOU SO MUCH!
@TechsavvyProductions
@TechsavvyProductions 2 года назад
You're welcome!
@jasonoldy69
@jasonoldy69 2 года назад
Excellent. Glad I subscribed
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Awesome, thank you!
@AdmV0rl0n
@AdmV0rl0n 2 года назад
Splendid stuff sir, really splendid!
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Glad you enjoyed it
@AdmV0rl0n
@AdmV0rl0n 2 года назад
@@TechsavvyProductions I've been in IT since the 90's. So many people fail to grasp how for many people the help file just showing switches doesn't actually translate into use. The smart folks will just 'get it' but many ordinary folk are left head scratching. In this video, you covered usage, but went quite deep into the actual examples of usage. If I could change one thing over the last 30 years, I'd have got people making the man pages and the destructions, and their /help and their command outlines have the switches, but also show some example usage lines of the switches. This is what you did here. You created a tour de force video on PSEXEC. Thank you :)
@TechsavvyProductions
@TechsavvyProductions 2 года назад
What you just shared is very true. Developers cut their teeth on command-line principles and early in their career get a good dose of syntax, but the IT professional is dropped off at the pool and left to swim or die. Syntax varies by who writes the code and often leaves everyone pulling hair. The video is addressing people like you and I who often need help in really understanding how it works and how to use parameters correctly. Thanks for the comment.
@user-wj5bq7xu4y
@user-wj5bq7xu4y Год назад
Psexec pode ser usado em rede sem domínio, apenas rede doméstica?
@TechsavvyProductions
@TechsavvyProductions Год назад
Ele suporta contas de administrador local
@SilentSolution
@SilentSolution 2 года назад
Thanks for your information Sir 👍
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching!
@psycl0ptic
@psycl0ptic 2 года назад
SSH! been doing this for years on linux; unix; macOS.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
When it comes to remote command line you are spot on!
@L3gion3r
@L3gion3r 2 года назад
How do you get the system information on your desktop?
@TechsavvyProductions
@TechsavvyProductions 2 года назад
systeminfo.exe is a great CLI tool that will pull system information back to your workstation via psexec.exe docs.microsoft.com/en-us/windows-server/administration/windows-commands/systeminfo
@johnnymh1111
@johnnymh1111 2 года назад
Excellent. Thank you.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching!
@a.useronly2266
@a.useronly2266 2 года назад
Thanks, so amazing 👌🏻
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching!
@johnsenchak1428
@johnsenchak1428 2 года назад
AMAZING VIDEO !
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching John!
@nicoladellino8124
@nicoladellino8124 2 года назад
Nice video, TNX.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Glad you liked it!
@info.pankaj24
@info.pankaj24 2 года назад
Thankyou Sir for your effort
@TechsavvyProductions
@TechsavvyProductions 2 года назад
It's my pleasure
@suzettegarcianomonsanto5648
@suzettegarcianomonsanto5648 2 года назад
Nice video very informative
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Glad you liked it
@MKamois
@MKamois 2 года назад
спасибо, было познавательно
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Спасибо за просмотр!
@luismarrero9293
@luismarrero9293 2 года назад
nevermind i just checked we only need port 445 running , thanks
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Thanks for watching!
@williamheckman4597
@williamheckman4597 2 года назад
Or just use an remote terminal? Not sure of the advantage of this.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
William, you are correct there are many tools for remote administration, psexec.exe is just one more in your tool box. Thanks for watching!
@petruciucur
@petruciucur Год назад
What about internet route?
@TechsavvyProductions
@TechsavvyProductions Год назад
Thanks for watching!
@chinesepopsongs00
@chinesepopsongs00 2 года назад
This tool will loose its power fast in serious IT as the whole remote part and how it works is more seen as a security problem than a usefull tool. So the way it connects to remote machines is blocked in business environments more and more. For me it is a little bit of a guess if i can use this at customer sites or not. Most of the time the bigger the customer the less chance that it still works.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Leon thanks for the comments!
@monKeman495
@monKeman495 2 года назад
how to bind DLL with psexec
@TechsavvyProductions
@TechsavvyProductions 2 года назад
not sure exactly what you mean by "bind DLL" but generally what you can do locally can be done remotely with psexec if console based.
@M0M3NTUM33
@M0M3NTUM33 8 месяцев назад
It is also great in spreading Ransomware
@TechsavvyProductions
@TechsavvyProductions 8 месяцев назад
Any admin tool can be dangerous in the wrong hands.
@M0M3NTUM33
@M0M3NTUM33 8 месяцев назад
@@TechsavvyProductions especially Microsoft admin tools
@KaiDzialas
@KaiDzialas 2 года назад
Oh c“mon. Arrive in 21st century and use Remote PowerShell. The first thing you do, when dealing with it security, is to get ridd of psexec - fast!
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Great comment, Remote PowerShell is awesome and is the go to automation CLI for admins. Psexec.exe is just another great tool and once understood can really be a quick solution to many problems. Psexec.exe though is not a security risk, without compromised credentials it is useless. Thanks for taking the time to comment.
@mass-any_key-lite
@mass-any_key-lite 2 года назад
PsExec - это облегченная замена Telnet, так что автор ролика ламер.
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Спасибо за честный отзыв
@ch1701a
@ch1701a 2 года назад
Can you play more annoying music in your introduction video? Because it really puts me off
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Craig thanks for feedback!
@alialis6417
@alialis6417 2 года назад
nice tool can be more helpful
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Yes, thanks
@waiskhan6770
@waiskhan6770 Год назад
Tn
@TechsavvyProductions
@TechsavvyProductions Год назад
Thanks for watching!
@knight024
@knight024 2 года назад
Windows should have useful tools built-in and not require people to download them. It's dumb
@TechsavvyProductions
@TechsavvyProductions 2 года назад
Good point, there are a ton of tools built in but Mark shares in this video done recently why he opted to keep this group of tools outside the Windows build cadence. ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-tR22u6H8E5w.html
@NotThatEpic7492
@NotThatEpic7492 Год назад
lets be honest, 99% of ppl just play around with psexec instead of actually using it for administration. on my school pc i accidentally elevated my privileges to NT AUTHORITY\SYSTEM and i had created a fake error with VBS. so i ran psexec64.exe \\* -i -s -d C:\users\1849245\desktop\error.vbs (that command executed my fake error on every school computer in the school) the teacher ended up calling IT 💀
@TechsavvyProductions
@TechsavvyProductions Год назад
If you decide to work in IT admin you will find it very handy to do useful work!
@NotThatEpic7492
@NotThatEpic7492 Год назад
yeah. this is an essential tool in the IT business, but also there are ppl who want to have fun with it as well. it just depends on what type of person you are and what sort of job you have. you have to be careful with the tool tho because if it falls into the wrong hands, (e.g. a hacker) that could be a serious issue
Далее
Hacking Windows TrustedInstaller (GOD MODE)
31:07
Просмотров 670 тыс.
PUBG Mobile СТАЛ ПЛАТНЫМ! 😳
00:31
Просмотров 95 тыс.
Track Phone & Computers on The Internet 🌎
30:50
Просмотров 1,9 млн
Is your PC hacked? RAM Forensics with Volatility
14:29
Просмотров 914 тыс.
Detecting PsExec Usage
23:16
Просмотров 11 тыс.
Free Security Tools Everyone Should Use
13:15
Просмотров 1 млн