Ethical Experts
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
 
HomeHome  SearchSearch  FAQFAQ  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Tue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Fri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Thu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Sat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Sat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Sat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Wed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Fri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Fri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
HACK WIFI PASSWORD USING CMD WHEN YOU ARE CONNECTED WITH WIFI
Hack Your BroadBand !! RISK FREE !!
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
Hacking With Keyloggers Prorat
How to Get Unlimited time in an Internet Cafe ... :D
How to Hack Websites & Servers - Tutorial
Cracking a WPA/WPA-2 Password.. ;)
Backtrack and Facebook
Credit Card Generating Sequence
Keywords
windows netcat backtrack
Facebook Like
Similar topics

Share | 
 

 Remote Administration

View previous topic View next topic Go down 
AuthorMessage
The Joker
Admin
Admin
avatar

Posts : 182
Join date : 2012-06-11
Age : 26

PostSubject: Remote Administration   Sun Oct 07, 2012 3:58 am

Next step to privilege escalation is executing commands and programs on compromised system I.e performing remote administration task. The task of executing commands and programs remotely on any system is known as remote administration. For a hacker it is quite necessary to administer remote system without installing any remote administration tool specially those which appear in process list and task manager.
Such functionality is only provided by command line tool and hence no matter how powerful and functional a graphical tool may appear a hacker will surely prefer a command line tool to do his/her job. Here we will consider both graphical as well as command line remote command and program execution tools but still preference will always be given to command line utilities.

PsTools:
Pstools is set of several tools that are created for remote execution. They work equally on Windows 2K, XP, NT 4.0 and server 2003. What sets these tools apart is that they allow you to manage remote as well as local system that too without any installation of third party software. Please note that some anti-virus programs report that some or all tools in Pstools are infected with RAT or remote admin virus. But none of these tools is infected, in fact many viruses use pstools in background for operation, hopefully if I retain this when I'll create a post on creating your own virus programs I'll surely cover using pstools in scope. Tools is pstools list include,

* PsExec - execute processes remotely
* PsFile - shows files opened remotely
* PsGetSid - display the SID of a computer or a user
* PsInfo - list information about a system
* PsKill - kill processes by name or process ID
* PsList - list detailed information about processes
* PsLoggedOn - see who's logged on locally and via resource sharing (full source is included)
* PsLogList - dump event log records
* PsPasswd - changes account passwords
* PsService - view and control services
* PsShutdown - shuts down and optionally reboots a computer
* PsSuspend - suspends processes
* PsUptime - shows you how long a system has been running since its last reboot (PsUptime's functionality has been incorporated into PsInfo)


Usage:
Ok the list is very big to cover but we can cover basic usage. And be sure what I ll cover about them is sufficient. For more information refer compiled HTML help script of tool.
Syntax:
If system is local
toolname options
Example:
C:\tools\PsTools>psexec.exe cmd winver

If system is remote system
toolname IP_address options
Example:
C:\tools\PsTools>psexec.exe 192.168.248.128 cmd winver

If system is domain system
toolname IP_Address,hostname options
Example:
C:\tools\PsTools>psexec.exe 192.168.248.128,demo cmd winver

If system asks for user name and password
toolname IP_Address -u user_name -p password options
Example:
C:\tools\PsTools>psexec.exe 192.168.248.128 -u demouser -p 12345 cmd winver

___________________________________________________
Do NOT PM me until you are DONATING or Your Upgrade  hasn't been completed even after you have purchased it .
If is one of the above, you can either choose to PM or mail me ..
Back to top Go down
View user profile http://teamiha.tumblr.com
 
Remote Administration
View previous topic View next topic Back to top 
Page 1 of 1
 Similar topics
-
» Selenium Remote Control misbehaves
» Negative Testing with Selenium JUnit 4 Remote Control and Eclipse
» Avoid browser closing on selenium RC shutdown
» Urgent --- how to get links under specific panel/ div/ table
» How to open Command prompt by coding in C# having Selenium Rc server path ?

Permissions in this forum:You cannot reply to topics in this forum
Ethical Experts :: Hacking Section :: Hacking Tutorials-
Jump to: