Remote command execution via Windows SMB. Execute commands on remote systems using PsExec or similar tools.
Remote Code Execution via SMB
Requires: Valid credentials • Difficulty: Low • Impact: High
💻 Desktop Experience Available
View this module on desktop for an interactive PSExec lateral movement simulation.
PSExec is a legitimate Microsoft Sysinternals tool for executing processes on remote Windows systems. However, it's frequently used by attackers for lateral movement and remote code execution in Active Directory environments. PSExec creates a service on the target system, executes commands, and cleans up—all over SMB.
psexec \\target cmd.exeAttackers use PSExec with compromised credentials (from Pass-the-Hash, Kerberoasting, etc.) to execute commands on remote systems. PSExec leaves minimal forensic artifacts—service creation/deletion is normal Windows behavior. It's a "living off the land" technique—using legitimate tools makes detection harder.
Why It's Effective: PSExec is a trusted, signed Microsoft tool. Many organizations allow it through firewalls and EDR solutions. It requires only SMB access and valid credentials—no special exploits needed. Perfect for lateral movement after initial compromise.
PSExec techniques should only be used in authorized penetration testing, red team engagements, or controlled lab environments. Unauthorized access to computer systems is illegal under CFAA and equivalent laws worldwide. Always obtain written permission before testing.
📡 Interactive Simulation Mode
Execute commands on remote Windows systems via SMB. Create service, run command, clean up. Living off the land—legitimate tool, malicious purpose.
TCP 445 (SMB) → ADMIN$ Share → Service Creation
Using credentials: CORP\admin
PSExec connects to remote systems via SMB (TCP 445), copies PSEXESVC.exe to the ADMIN$ share, creates a service, executes your command, and cleans up. All using legitimate Microsoft tools.
Requires valid credentials (username:password or NTLM hash) and SMB access to target. Often used after Pass-the-Hash, Kerberoasting, or credential dumping for lateral movement.