• Close
  • Back to search

    Microsoft Windows Authenticated User Code Execution

    This module uses a valid administrator username and password (or password hash) to execute an arbitrary payload. This module is similar to the "psexec" utility provided by SysInternals. This module is now able to clean up after itself. The service created by this tool uses a randomly chosen name and description.

    Free Metasploit Download

    Get your copy of the world's leading penetration testing tool

     Download Now

    Module Name

    exploit/windows/smb/psexec

    Authors

    • hdm <x [at] hdm.io>
    • Royce Davis <rdavis [at] accuvant.com>
    • RageLtMan <rageltman [at] sempervictus>

    References

    Targets

    • MOF upload
    • Automatic
    • PowerShell
    • Native upload

    Platforms

    • windows

    Architectures

    • x86
    • x86_64

    Reliability

    Development

    Module Options

    To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

    msf > use exploit/windows/smb/psexec msf exploit(psexec) > show targets ...targets... msf exploit(psexec) > set TARGET <target-id> msf exploit(psexec) > show options ...show and set options... msf exploit(psexec) > exploit

    Related Vulnerabilities

    Related Modules