Once you have PsExec downloaded on your remote computer, the next step is to set it up for connection to a target host. These are:. File and Printer Sharing must be enabled on both the local and remote host. On the left side of the opened window, click the Change Advanced Sharing Settings. Select Turn on File and Printer Sharing and save changes. In the new window, open the Users folder. Right click on Administrator and select Properties. In the Properties window, uncheck the Account is disabled checkbox and click OK.
Right-click Administrators again and click Set Password to set your account password. Have the correct user credential of the remote computer, i. For PsExec to work correctly, its syntax needs to be exact. Another way to use PsExec is to enter individual commands but without starting a full Command Prompt.
In this example, we're executing the tracert command against lifewire. Here, we're using PsExec to launch Registry Editor on the remote machine, mikelaptopw10 , in the System account. Because -i is used, the program will open in interactive mode, meaning that it will actually launch on the remote machine's screen. If -i were omitted from the above command, it would execute in hidden mode to avoid showing any dialog boxes or other windows.
Adding an argument like that requires cmd. It's very important to understand how powerful PsExec is and how it could be used to compromise your computer when used in an otherwise unsecure environment. For example, combining -c , -u , and -p , specifically will let anyone with a network connection to your computer, and knowledge of the admin credentials, execute secret malware with anyone's credentials.
Even that last, perfectly acceptable example in the previous section takes on a whole new purpose when you consider that instead of CCleaner, someone could install anything else they desired, in the background, and no windows pop up to show that anything is happening. All that said, considering the firewall changes required and administrator credentials knowledge someone would have to have, there's little reason to worry so long as the admin password on the remote computer is complex and other basic security measures have been taken.
Some antivirus programs falsely identify PsExec as a dangerous file, but those warnings can be ignored if you know for sure that the program you're using is from the Microsoft source above. The reason this happens is because malware has been known to use PsExec to transfer viruses.
Actively scan device characteristics for identification. Use precise geolocation data. Select personalised content. Create a personalised content profile. Measure ad performance. Select basic ads. Create a personalised ads profile. Select personalised ads. Apply market research to generate audience insights. Measure content performance. This tool is just one of many in the SysInternals toolkit, but one of the most venerable and oft-used by IT professionals. If you are a system administrator with many systems to monitor and maintain, PSExec offers a quick and easy way to remotely administer any system you might have.
Technical February 12, 3 min to read. Adam Bertram. Best practices. Installing Software Installing and updating software is often a never-ending process. Conclusion PSExec has been around a long time, and after it was acquired by Microsoft, it has continued to grow and thrive.
Adam Bertram Adam Bertram is a year veteran of IT and an experienced online business professional. Previous post Next post. Get weekly blog updates. Typing Ctrl-C terminates the remote process. If you omit a user name, the process will run in the context of your account on the remote system, but will not have access to network resources because it is impersonating. Note that the password and command are encrypted in transit to the remote system.
This article I wrote describes how PsExec works and gives tips on how to use it:. This command copies the program test. Specify the full path to a program that is already installed on a remote system if its not on the system's path:. PsExec is part of a growing kit of Sysinternals command-line tools that aid in the administration of local and remote systems named PsTools. Feedback will be sent to Microsoft: By pressing the submit button, your feedback will be used to improve Microsoft products and services.
Privacy policy. Skip to main content.
0コメント