Awesome clip I was having trouble understanding the whole psexec thing, your video cleared so much things up, but I have a question you need target system credentials or some sort of hash to use psexec against it right?
I'm not sure I understand the question. Are you asking what credentials you would need to use PsExec against a target system? Local admin rights would typically be required.
@@13Cubed in an Active Directory environment, most of the users are standard users with non-admin privileges, you have to access some kind of privileged account, in a p2p scenario what you said makes scenes but what if you compromise a system which doesn’t have admin privileges
You have to elevate your permissions. PsExec works by installing a service on the target system to facilitate execution of the commands, and that requires admin privileges.
what I also wondering, do you have also a tutorial which discuss topic's like forensic analysis on multiple hosts? as example if have 20 host to analyse.. Do you have a tool which helps you to collect and then analyse the artefacts?
Check out the Introduction to Kansa episode -- that might be of interest. Also perhaps Introduction to KAPE. If helpful, a full episode guide is available at 13cubed.com/episodes.
You tutorials are excellent, but please turn off that annoying background music.. It's very distracting.
Lol ok, noted. First complaint I've received :)
Awesome explanation !
And please make the font bigger, on mobile devices it is too small.
Who is after viewing john video
Meee
Amazing explanation and Demo!
Very useful information! I've been working and studying to get back into forensics after a few years away and your videos are very helpful.
Thanks for the quality videos)
Awesome clip I was having trouble understanding the whole psexec thing, your video cleared so much things up, but I have a question you need target system credentials or some sort of hash to use psexec against it right?
I'm not sure I understand the question. Are you asking what credentials you would need to use PsExec against a target system? Local admin rights would typically be required.
@@13Cubed in an Active Directory environment, most of the users are standard users with non-admin privileges, you have to access some kind of privileged account, in a p2p scenario what you said makes scenes but what if you compromise a system which doesn’t have admin privileges
You have to elevate your permissions. PsExec works by installing a service on the target system to facilitate execution of the commands, and that requires admin privileges.
Thank you! I would also be interested in a video about CrackMapExec / Impacked
Impacket has been done -- check out th-cam.com/video/UMogme3rDRA/w-d-xo.html (and the two cheat sheets).
@@13Cubed That's right, I even commented there. I think I need to rewatch a few videos. :D ty!
Good content. Thanks a lot for this.
fantastic info thank you!
Awesome as always!
superb
very nice Tutorial..thanks for it👍👍
what I also wondering, do you have also a tutorial which discuss topic's like forensic analysis on multiple hosts? as example if have 20 host to analyse.. Do you have a tool which helps you to collect and then analyse the artefacts?
Check out the Introduction to Kansa episode -- that might be of interest. Also perhaps Introduction to KAPE. If helpful, a full episode guide is available at 13cubed.com/episodes.
@@13Cubed thanks a lot for xour advice