Getting Started with PS Tools

January 28, 2017 | Views: 9689

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

 

Estimated reading time: 1 minute

I found a really good toolset which may come in handy when it comes to doing things remotely. This may help admins and other IT staff that need to do things remotely.

Download the PS tools, which can be found easily and downloaded from the internet.

1) PsExec

The below command will give us the cmd of the remote machine. If you want to execute the program on the remote machine, then just add -i -s -d after the psexec command.

command : psexec \remoteIP -u username -p password cmd

psexec-1

psexec-2

psexec-3

psexec-4

2) Getting the security ID (psgetsid)

command : psgetsid \remoteIP -u username -p password

psgetsid-5

3) pskill – killing the process with process ID

command : pskill \remoteIP -u username -p password processID

pskill-6

4) psservice  – finding if a particular service is present or not

command : psservice \remoteIP -u username -p password service_name

psservice-7

 

5) psshutdown

command : psshutdown \remoteIPpsshutdown-8

Thanks  🙂

Comment below if you have any questions or suggestions.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
8 Comments
  1. So in my current role, I use psexec on an hourly basis when I’m working with client installs. one thing I wanted to point out is that if you are on an Enterprise type network, AD ect, as long as your admin command prompt has those same permissions on the target system you can skip the user name and password and simply do: psexec \\ cmd /I

    it’s important to note that if you don’t use the /I flag at the end, you won’t be able to interact with that target system as if you were right in front of it. Additionally Killing tasks even by their id can be tricky if the system has been locked down (or as we in the army call it STIG’ed) as for some reason certain tasks, processes and services are hidden from psexec’s view. a great example of this is Firefox. hope this helps!

  2. Good information to have. Also a shout out to Jimkats for the additional list. Thanks all

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel