Remote Processes Spawn
PSEXEC (SYSINTERNALS)
Ports: 445/TCP 9SMB)
Group Memberships: Administrators
How does it work?
Example:
psexec64.exe \\MACHINE_IP -u Administrator -p PASSWORD -i cmd.exeWINRM
Ports: 5985/TCP (WinRM HTTP), 5986/TCP (WinRM HTTPS)
Group Memberships: Remote Managenemt Users
POWERSHELL
Steps:
SC
Ports: 135/TCP, 49152-65535/TCP (DCE/RPC) 445/TCP (RPC over SMB named pipes) 139/TCP (RPC over SMB named pipes)
Group Memberships: Administrators
SCHEDULED TASKS REMOTE CREATION
Last updated