Detecting PsExec Usage

Sdílet
Vložit
  • čas přidán 20. 08. 2024

Komentáře • 23

  • @aakashraman274
    @aakashraman274 Před měsícem

    Amazing explanation and Demo!

  • @KenPryor
    @KenPryor Před rokem

    Very useful information! I've been working and studying to get back into forensics after a few years away and your videos are very helpful.

  • @tg7943
    @tg7943 Před rokem

    Awesome as always!

  • @user-wc1ze6mz7q
    @user-wc1ze6mz7q Před rokem

    Thanks for the quality videos)

  • @cybersamurai99
    @cybersamurai99 Před 11 měsíci

    fantastic info thank you!

  • @prabhatjoshi602
    @prabhatjoshi602 Před rokem

    Good content. Thanks a lot for this.

  • @CatSmiling
    @CatSmiling Před rokem

    superb

  • @havyj1
    @havyj1 Před 5 měsíci

    Awesome clip I was having trouble understanding the whole psexec thing, your video cleared so much things up, but I have a question you need target system credentials or some sort of hash to use psexec against it right?

    • @13Cubed
      @13Cubed  Před 5 měsíci +1

      I'm not sure I understand the question. Are you asking what credentials you would need to use PsExec against a target system? Local admin rights would typically be required.

    • @havyj1
      @havyj1 Před 5 měsíci

      @@13Cubed in an Active Directory environment, most of the users are standard users with non-admin privileges, you have to access some kind of privileged account, in a p2p scenario what you said makes scenes but what if you compromise a system which doesn’t have admin privileges

    • @13Cubed
      @13Cubed  Před 5 měsíci +1

      You have to elevate your permissions. PsExec works by installing a service on the target system to facilitate execution of the commands, and that requires admin privileges.

  • @ciaobello1261
    @ciaobello1261 Před rokem

    very nice Tutorial..thanks for it👍👍

    • @ciaobello1261
      @ciaobello1261 Před rokem

      what I also wondering, do you have also a tutorial which discuss topic's like forensic analysis on multiple hosts? as example if have 20 host to analyse.. Do you have a tool which helps you to collect and then analyse the artefacts?

    • @13Cubed
      @13Cubed  Před rokem +1

      Check out the Introduction to Kansa episode -- that might be of interest. Also perhaps Introduction to KAPE. If helpful, a full episode guide is available at 13cubed.com/episodes.

    • @ciaobello1261
      @ciaobello1261 Před rokem +1

      @@13Cubed thanks a lot for xour advice

  • @errolgannon3152
    @errolgannon3152 Před rokem +5

    You tutorials are excellent, but please turn off that annoying background music.. It's very distracting.

    • @13Cubed
      @13Cubed  Před rokem +1

      Lol ok, noted. First complaint I've received :)

  • @vidyasagar285
    @vidyasagar285 Před rokem +1

    And please make the font bigger, on mobile devices it is too small.

  • @SkipToPlay
    @SkipToPlay Před rokem

    Thank you! I would also be interested in a video about CrackMapExec / Impacked

    • @13Cubed
      @13Cubed  Před rokem +1

      Impacket has been done -- check out czcams.com/video/UMogme3rDRA/video.html (and the two cheat sheets).

    • @SkipToPlay
      @SkipToPlay Před rokem

      @@13Cubed That's right, I even commented there. I think I need to rewatch a few videos. :D ty!

  • @mahirkhan4124
    @mahirkhan4124 Před měsícem

    Who is after viewing john video