Psexec.exe: A Powerful tool for IT Admins

Sdílet
Vložit
  • čas přidán 3. 07. 2024
  • Psexec.exe is a powerful command-line local and remote shell that can offer powerful solutions facing IT admins running an enterprise network. It is a remote shell that works with most CLI programs and utilities, PowerShell, can be executed in a batch file or PS1 file. Allows applications and utilities to be executed under the SYSTEM account. Does not require installation and removes all processes, threads, and functions upon termination both locally and on the remote host. Psexec allows you to control what session the program/utility runs. Learn a tool that you will find so many uses for in your work environment.
    Please consider becoming a channel member:
    • you get an early viewing of all our video content
    • access to the complete series of videos for each subject
    • links to video notes and PowerPoint slide deck both in MS-Word and PDF format
    • Our eBook and resources folder
    • Join our channel membership, it’s $2.99/month); see the “Join” button on our channel homepage. / @techsavvyproductions
    "Everybody can be great... because anybody can serve. You don't have to have a college degree to serve. You don't have to make your subject and verb agree to serve. You only need a heart full of grace. A soul generated by love." Martin Luther King Jr.
    Check out our CZcams channel for more content!
    CZcams: / vanderl2796
    Check out our Website: www.techsavvyproductions.com
    Follow us on Twitter: @_TechSavvyTeam
    Like us on Facebook: / tech-savvy-productions...
    Mr.V Linkedin: / lowell-vanderpool-5797...
    Links to Documentation
    PowerPoints in *.pptx format:
    docs.google.com/presentation/...
    Slide Deck in PDF:
    drive.google.com/file/d/1cOgQ...
    Video Notes in *.docx:
    docs.google.com/document/d/1s...
    Video Notes in PDF:
    drive.google.com/file/d/16XDJ...
    Email: mrvanderpool@techsavvyproductions.com
    More TechSavvyProductions Videos that you might enjoy:
    We translate subtitles on our videos into the following languages: عربى, българскиB, 简体中文), 中國傳統的), Nederlands, Suomalainen, Pilipino, français, Deutsche, हिंदी , Magyar, bahasa Indonesia, 日本語, 한국어, norsk, Polskie, português, Română, русский, Española, Kiswahili, Svenska, and Tiếng Việt
    #techsavvyproductions #vanderl2796 #LowellVanderpool
    1. Introduction to building SMB Firewall rules using open-source security appliances.
    • Open-Source Pfsense Fi...
    2. Solving Electrical Problems in your Data Network
    • Electrical Mysteries U...
    3. What is Software Defined Networking: SDN?
    • SDN 101: A Comprehensi...
    4. What is a ToR network switch?
    • ToR Switch Demystified...
    5. Removing the Mystery of Hyper-V Checkpoints
    • Removing the Mystery o...
    6. Day 1: Troubleshooting Windows Applications. What is a process and What are threads?
    • Mastering Windows Appl...
    7. Day 2: Troubleshooting Windows Applications. Types of Applications and Processes.
    • Troubleshooting Essent...
    8. TPM 2.0 Trusted Platform Module Introduction
    • TPM 2.0 Unveiled: Empo...
    9. Advanced Troubleshooting for Frozen/Lockup Computers/Servers and Applications
    • Resolving Windows Appl...
    10. Windows Docker Containers: Explained
    • Unlocking the Power of...
  • Věda a technologie

Komentáře • 136

  • @salvadorrobledo9419
    @salvadorrobledo9419 Před 2 lety +5

    Been watching your videos for years. Thank you for going in depth with this tool as I use it but now have a better understanding of it and learned so many new things it can do. I Appreciate all the great content 👌

  • @SlothMcLazy
    @SlothMcLazy Před 5 měsíci +1

    One of the best tutorials I have seen on CZcams. Thank you!

  • @frymc5351
    @frymc5351 Před 2 lety

    One of my new favorite lessons on this channel. Thank you for this video.

  • @freestyleTommy
    @freestyleTommy Před rokem +1

    Love it!! I love how you leave the errors… and explain how you corrected them…
    Thank you.

  • @TheAlexkidx
    @TheAlexkidx Před 2 lety +2

    Essa foi uma das aulas mais úteis que já assistí aqui, parabéns pelo seu conteúdo.

  • @JohnJohn-sf1df
    @JohnJohn-sf1df Před 2 lety +1

    Fantastic. Just found your channel. Subbed!

  • @ahirnimesh09
    @ahirnimesh09 Před 2 lety

    thank you making such curical topic video, your videos are useful for us who is working as sysadmin.

  • @MsErmess
    @MsErmess Před 2 lety +1

    Thanks a lot, brilliantly explained. Very educative.

  • @ajaidx
    @ajaidx Před rokem

    Thanks a lot MR.V

  • @aristotelesfernando
    @aristotelesfernando Před 2 lety

    I never hear about that channel! awesome!

  • @henrytongunclement2098

    Great tool I like it plus your presentation is super straight forward. Thanks

  • @yagneshmalaviya5169
    @yagneshmalaviya5169 Před 2 lety +1

    Hats off. Great content great editing
    Thank you for investing time in creating this video.. bless you 🙌 🙌

  • @jonathansantiago8438
    @jonathansantiago8438 Před 3 měsíci

    Great Tutorial, Thank you.

  • @pawansmy1844
    @pawansmy1844 Před 2 lety

    Much thanks for beautiful explanation

  • @user-yi4ef2gk1o
    @user-yi4ef2gk1o Před 2 měsíci

    Great video, this is very weaponizable!!!

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 měsíci +1

      Keep in mind if basic security is compromised all tools can be weaponized. It is a fantastic tool for admins as is PowerShell.

  • @samiyanes1598
    @samiyanes1598 Před rokem

    THANK YOU SO MUCH!

  • @hadibq
    @hadibq Před 2 lety

    nice discovery! new sub indeed! TY!

  • @ahmedsalaheldin6275
    @ahmedsalaheldin6275 Před 2 lety

    My favorite Channel 💪💪💪💪

  • @andytheunico
    @andytheunico Před rokem

    Desde Perú, excelente guía.
    From Peru, useful guide!!

  • @AshraRai
    @AshraRai Před 2 lety

    This is very useful lesson on brilliant tool. Thank you sir.

  • @jasonoldy69
    @jasonoldy69 Před 2 lety

    Excellent. Glad I subscribed

  • @johnnymh1111
    @johnnymh1111 Před 2 lety

    Excellent. Thank you.

  • @r3tr0n17
    @r3tr0n17 Před rokem

    Excellent tutorial.. Thanks !

  • @rory_rox
    @rory_rox Před 9 měsíci

    Was a sysadmin for years before I became familiar with PSExec.exe and boy it is such a game changer. Everyone in IT should be familiar with how to use it. Be careful however, always remember the more powerful the tool, the more respect you need to give it. Think carefully before you hit that big enter key.

  • @Silvermist78
    @Silvermist78 Před 9 měsíci

    Sir you are awesome! 🙏🙏🙏🙏👏

  • @SilentSolution
    @SilentSolution Před 2 lety

    Thanks for your information Sir 👍

  • @KristenWieland
    @KristenWieland Před 9 měsíci

    You, sir, are amazing

  • @certisfoster9716
    @certisfoster9716 Před 2 lety

    The biblical verses is just icing on the cake Mr. V 🍻. All your content is superb.

  • @info.pankaj24
    @info.pankaj24 Před 2 lety

    Thankyou Sir for your effort

  • @mikemurray2875
    @mikemurray2875 Před 2 lety +1

    Thanks for filling us in on how hackers do things :-)

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety +1

      Mike just keep your admin credentials secure and I promise they will not use them.

  • @a.useronly2266
    @a.useronly2266 Před 2 lety

    Thanks, so amazing 👌🏻

  • @andreigiubleanu
    @andreigiubleanu Před rokem

    LV is the man!

  • @default19in
    @default19in Před 2 lety

    There is one tool called batchpatch which uses this same psexec service and help to install everything in network.
    TX for depth knowledge sirjee.

  • @nicoladellino8124
    @nicoladellino8124 Před 2 lety

    Nice video, TNX.

  • @AdmV0rl0n
    @AdmV0rl0n Před 2 lety

    Splendid stuff sir, really splendid!

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety

      Glad you enjoyed it

    • @AdmV0rl0n
      @AdmV0rl0n Před 2 lety

      @@TechsavvyProductions I've been in IT since the 90's. So many people fail to grasp how for many people the help file just showing switches doesn't actually translate into use. The smart folks will just 'get it' but many ordinary folk are left head scratching. In this video, you covered usage, but went quite deep into the actual examples of usage.
      If I could change one thing over the last 30 years, I'd have got people making the man pages and the destructions, and their /help and their command outlines have the switches, but also show some example usage lines of the switches.
      This is what you did here. You created a tour de force video on PSEXEC.
      Thank you :)

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety

      What you just shared is very true. Developers cut their teeth on command-line principles and early in their career get a good dose of syntax, but the IT professional is dropped off at the pool and left to swim or die. Syntax varies by who writes the code and often leaves everyone pulling hair. The video is addressing people like you and I who often need help in really understanding how it works and how to use parameters correctly. Thanks for the comment.

  • @malcolmmoore9938
    @malcolmmoore9938 Před 2 lety

    Mark Russinovich recommended your video 😉

  • @johnsenchak1428
    @johnsenchak1428 Před 2 lety

    AMAZING VIDEO !

  • @suzettegarcianomonsanto5648

    Nice video very informative

  • @luismarrero9293
    @luismarrero9293 Před rokem

    great tutorial thank you so much. one question do we need to do a configuration on the remote computer in order to work? like installing psexec or something else. in addition to probably have the print sharing port enable

  • @psycl0ptic
    @psycl0ptic Před 2 lety

    SSH! been doing this for years on linux; unix; macOS.

  • @MKamois
    @MKamois Před 2 lety

    спасибо, было познавательно

  • @vtreanor
    @vtreanor Před 2 lety

    Great delivery but I've got no use for the flash bang intro stuff. Content was impressive.

  • @GooogleGoglee
    @GooogleGoglee Před 2 lety

    Beautiful video and insight of psexec thank you
    Does the concept of the sessions apply also to Linux/Unix systems? Do they have 3 session total too in the same way?
    Thank you

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety

      Great question: I am not as sure of the GUI architecture in Linux as I am in Windows. I will look and see if anyone does a comparison.

    • @NotThatEpic7492
      @NotThatEpic7492 Před rokem

      it isnt necessarily 3 sessions, esch user who logs in will have another session created for them.
      for example: session 0 is created on boot and when the normal user logs in, session 1 is created for thet user. when someone connects with RDC, session 2 is created for it. lets say a second user logs into the computer (e.g. a family member), they would get session 3

    • @NotThatEpic7492
      @NotThatEpic7492 Před rokem

      and so on…

  • @RossCanpolat
    @RossCanpolat Před 2 lety

    So for example with the VLC install if you did not specify a silent install would you have seen the VLC installer appear on your local machine where you scroll through the licence agreement and hit next several times to install it on the remote machine? Or is that type of remote install only capable over a GUI like remote desktop, teamviewer etc?

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety +1

      Ross, this a console tool so no GUI that is why we want a silent install. If you using RDC or Teamviewer then you are thinking correctly but then must select the proper "session" if you want to interact with the install. Great questions!

    • @RossCanpolat
      @RossCanpolat Před 2 lety

      @@TechsavvyProductions so what would have happened if you didn't select "silent" and just ran the installer while still being within the "session 0" mode? Would the user have seen a GUI installer pop up & would you would have been presented with installation options like agreeing to the EULA, choosing the installation directory etc via your shell prompt?

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety

      Keep in mind Session 0 is where protected processes and services are run and the logged on user can not interact with them. You must select a session that the user can view {logged on with keyboard Session 1} {RDC or virtual machine Session 2}

  • @luismarrero9293
    @luismarrero9293 Před rokem

    hello there great video very interesting theme . I wonder if we must use always Admnistrator system user or we can work with a local admin account too.????

    • @TechsavvyProductions
      @TechsavvyProductions  Před rokem

      Luis, yes you can use local admin also.

    • @luismarrero9293
      @luismarrero9293 Před rokem

      @@TechsavvyProductions i tried but it didn't work for me . I have error you need to enable admin$ share on this computer

  • @L3gion3r
    @L3gion3r Před rokem

    How do you get the system information on your desktop?

    • @TechsavvyProductions
      @TechsavvyProductions  Před rokem

      systeminfo.exe is a great CLI tool that will pull system information back to your workstation via psexec.exe docs.microsoft.com/en-us/windows-server/administration/windows-commands/systeminfo

  • @GuNdEiGuRkE
    @GuNdEiGuRkE Před 11 měsíci

    Hey somehow I have a weird error: When running 'psexec \\IP-Address -siu Administrator cmd' I get the cmd on my machine, but when I want the cmd to pop up on the remote machine, I run the same command you did in the video so 'psexec \\IP-Address -s -i 2 -u Administrator cmd' i get 'access denied - psexec could not start cmd on 'IP-Address'' do you have an idea what this is about and how to solve this?

  • @efmece
    @efmece Před 2 lety +1

    why would you use Psexec rather than Powershell?
    AFAIK powershell is more secured and uses really well windows API (powershell was created by microsoft). Its also native in all kind of windows.
    And if you want to connect to a remote machine (Enter-PSsesion can do it) and Invoke-command can run scripts to many systems parallely
    I just want to understand why psexec?

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety

      Efrain, you are correct PowerShell is the tool for Enterprise! The video was simply explaining how to use it and how it works. It still can be a useful tool for many. Cheers!

  • @user-wj5bq7xu4y
    @user-wj5bq7xu4y Před rokem

    Psexec pode ser usado em rede sem domínio, apenas rede doméstica?

  • @Bigjunk9999
    @Bigjunk9999 Před 7 měsíci

    IS there any workaround to getting PSEXEC to be able to speak with workstations that have had their Admin$ share disabled? I'm hitting in impasse with this at work.

    • @TechsavvyProductions
      @TechsavvyProductions  Před 7 měsíci

      It is rare to find Enterprises disabling Admin$, no it is a requirement for PSEXEC.

    • @Bigjunk9999
      @Bigjunk9999 Před 7 měsíci

      Thanks for confirming. And great video!

  • @luismarrero9293
    @luismarrero9293 Před rokem

    nevermind i just checked we only need port 445 running , thanks

  • @petruciucur
    @petruciucur Před 11 měsíci

    What about internet route?

  • @monKeman495
    @monKeman495 Před 2 lety

    how to bind DLL with psexec

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety +1

      not sure exactly what you mean by "bind DLL" but generally what you can do locally can be done remotely with psexec if console based.

  • @williamheckman4597
    @williamheckman4597 Před 2 lety

    Or just use an remote terminal? Not sure of the advantage of this.

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety

      William, you are correct there are many tools for remote administration, psexec.exe is just one more in your tool box. Thanks for watching!

  • @M0M3NTUM33
    @M0M3NTUM33 Před 5 měsíci

    It is also great in spreading Ransomware

    • @TechsavvyProductions
      @TechsavvyProductions  Před 5 měsíci

      Any admin tool can be dangerous in the wrong hands.

    • @M0M3NTUM33
      @M0M3NTUM33 Před 5 měsíci

      @@TechsavvyProductions especially Microsoft admin tools

  • @chinesepopsongs00
    @chinesepopsongs00 Před 2 lety

    This tool will loose its power fast in serious IT as the whole remote part and how it works is more seen as a security problem than a usefull tool. So the way it connects to remote machines is blocked in business environments more and more. For me it is a little bit of a guess if i can use this at customer sites or not. Most of the time the bigger the customer the less chance that it still works.

  • @alialis6417
    @alialis6417 Před 2 lety

    nice tool can be more helpful

  • @waiskhan6770
    @waiskhan6770 Před rokem

    Tn

  • @mass-any_key-lite
    @mass-any_key-lite Před 2 lety

    PsExec - это облегченная замена Telnet, так что автор ролика ламер.

  • @KaiDzialas
    @KaiDzialas Před 2 lety +4

    Oh c“mon. Arrive in 21st century and use Remote PowerShell. The first thing you do, when dealing with it security, is to get ridd of psexec - fast!

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety +3

      Great comment, Remote PowerShell is awesome and is the go to automation CLI for admins. Psexec.exe is just another great tool and once understood can really be a quick solution to many problems. Psexec.exe though is not a security risk, without compromised credentials it is useless. Thanks for taking the time to comment.

  • @knight024
    @knight024 Před 2 lety

    Windows should have useful tools built-in and not require people to download them. It's dumb

    • @TechsavvyProductions
      @TechsavvyProductions  Před 2 lety

      Good point, there are a ton of tools built in but Mark shares in this video done recently why he opted to keep this group of tools outside the Windows build cadence. czcams.com/video/tR22u6H8E5w/video.html

  • @ch1701a
    @ch1701a Před 2 lety +1

    Can you play more annoying music in your introduction video? Because it really puts me off

  • @NotThatEpic7492
    @NotThatEpic7492 Před rokem

    lets be honest, 99% of ppl just play around with psexec instead of actually using it for administration.
    on my school pc i accidentally elevated my privileges to NT AUTHORITY\SYSTEM and i had created a fake error with VBS.
    so i ran psexec64.exe \\* -i -s -d C:\users\1849245\desktop\error.vbs (that command executed my fake error on every school computer in the school)
    the teacher ended up calling IT 💀

    • @TechsavvyProductions
      @TechsavvyProductions  Před rokem

      If you decide to work in IT admin you will find it very handy to do useful work!

    • @NotThatEpic7492
      @NotThatEpic7492 Před rokem

      yeah. this is an essential tool in the IT business, but also there are ppl who want to have fun with it as well.
      it just depends on what type of person you are and what sort of job you have. you have to be careful with the tool tho because if it falls into the wrong hands, (e.g. a hacker) that could be a serious issue