1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-09-10 15:13:52 +02:00

psexec.py, impacket-psexec: add page (#17094)

This commit is contained in:
Machiavelli 2025-07-09 06:04:19 +03:00 committed by GitHub
parent fbdea13371
commit 8cd726d95f
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
2 changed files with 40 additions and 0 deletions

View file

@ -0,0 +1,7 @@
# impacket-psexec
> This command is an alias of `psexec.py`.
- View documentation for the original command:
`tldr psexec.py`

33
pages/common/psexec.py.md Normal file
View file

@ -0,0 +1,33 @@
# psexec.py
> Execute commands on a remote Windows machine using `RemComSvc`, providing PsExec-like functionality.
> Part of the Impacket suite.
> More information: <https://github.com/fortra/impacket>.
- Spawn an interactive shell on a remote target:
`psexec.py {{domain}}/{{username}}:{{password}}@{{target}}`
- Execute a specific command on a remote target:
`psexec.py {{domain}}/{{username}}:{{password}}@{{target}} {{command}}`
- Copy the filename for later execution, arguments are passed in the command:
`psexec.py -c {{filename}} {{domain}}/{{username}}:{{password}}@{{target}} {{command}}`
- Execute a command from a specific path on a remote target:
`psexec.py -path {{path}} {{domain}}/{{username}}:{{password}}@{{target}} {{command}}`
- Authenticate using pass-the-hash authentication instead of a password:
`psexec.py -hashes {{LM_Hash}}:{{NT_Hash}} {{domain}}/{{username}}@{{target}}`
- Use Kerberos authentication for the target:
`psexec.py -k -no-pass {{domain}}/{{username}}@{{target}}`
- Specify the IP address of the domain controller:
`psexec.py -dc-ip {{domain_controller_ip}} {{domain}}/{{username}}:{{password}}@{{target}}`