Detecting PsExec Usage

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ย. 2024

ความคิดเห็น • 24

  • @errolgannon3152
    @errolgannon3152 ปีที่แล้ว +5

    You tutorials are excellent, but please turn off that annoying background music.. It's very distracting.

    • @13Cubed
      @13Cubed  ปีที่แล้ว +1

      Lol ok, noted. First complaint I've received :)

  • @nournote
    @nournote หลายเดือนก่อน

    Awesome explanation !

  • @vidyasagar285
    @vidyasagar285 ปีที่แล้ว +1

    And please make the font bigger, on mobile devices it is too small.

  • @mahirkhan4124
    @mahirkhan4124 2 หลายเดือนก่อน

    Who is after viewing john video

  • @aakashraman274
    @aakashraman274 2 หลายเดือนก่อน

    Amazing explanation and Demo!

  • @KenPryor
    @KenPryor ปีที่แล้ว

    Very useful information! I've been working and studying to get back into forensics after a few years away and your videos are very helpful.

  • @NameSurname-q8d
    @NameSurname-q8d ปีที่แล้ว

    Thanks for the quality videos)

  • @havyj1
    @havyj1 7 หลายเดือนก่อน

    Awesome clip I was having trouble understanding the whole psexec thing, your video cleared so much things up, but I have a question you need target system credentials or some sort of hash to use psexec against it right?

    • @13Cubed
      @13Cubed  7 หลายเดือนก่อน +1

      I'm not sure I understand the question. Are you asking what credentials you would need to use PsExec against a target system? Local admin rights would typically be required.

    • @havyj1
      @havyj1 7 หลายเดือนก่อน

      @@13Cubed in an Active Directory environment, most of the users are standard users with non-admin privileges, you have to access some kind of privileged account, in a p2p scenario what you said makes scenes but what if you compromise a system which doesn’t have admin privileges

    • @13Cubed
      @13Cubed  6 หลายเดือนก่อน +1

      You have to elevate your permissions. PsExec works by installing a service on the target system to facilitate execution of the commands, and that requires admin privileges.

  • @SkipToPlay
    @SkipToPlay ปีที่แล้ว

    Thank you! I would also be interested in a video about CrackMapExec / Impacked

    • @13Cubed
      @13Cubed  ปีที่แล้ว +1

      Impacket has been done -- check out th-cam.com/video/UMogme3rDRA/w-d-xo.html (and the two cheat sheets).

    • @SkipToPlay
      @SkipToPlay ปีที่แล้ว

      @@13Cubed That's right, I even commented there. I think I need to rewatch a few videos. :D ty!

  • @prabhatjoshi602
    @prabhatjoshi602 ปีที่แล้ว

    Good content. Thanks a lot for this.

  • @cybersamurai99
    @cybersamurai99 ปีที่แล้ว

    fantastic info thank you!

  • @tg7943
    @tg7943 ปีที่แล้ว

    Awesome as always!

  • @CatSmiling
    @CatSmiling ปีที่แล้ว

    superb

  • @ciaobello1261
    @ciaobello1261 ปีที่แล้ว

    very nice Tutorial..thanks for it👍👍

    • @ciaobello1261
      @ciaobello1261 ปีที่แล้ว

      what I also wondering, do you have also a tutorial which discuss topic's like forensic analysis on multiple hosts? as example if have 20 host to analyse.. Do you have a tool which helps you to collect and then analyse the artefacts?

    • @13Cubed
      @13Cubed  ปีที่แล้ว +1

      Check out the Introduction to Kansa episode -- that might be of interest. Also perhaps Introduction to KAPE. If helpful, a full episode guide is available at 13cubed.com/episodes.

    • @ciaobello1261
      @ciaobello1261 ปีที่แล้ว +1

      @@13Cubed thanks a lot for xour advice