Would you like to learn how to execute commands, programs, and open command prompts or PowerShell sessions on remote Windows hosts? In this course, Lateral Movement with PsExec, you will gain the ability to use PsExec to laterally move throughout a Windows domain from a host you already exploited. First, you will learn how to use PsExec to run commands on remote Windows hosts. Next, you will discover how to leverage PsExec to run programs remotely. Finally, you will explore how to laterally move throughout a Windows domain using PsExec. When you are finished with this course, you will have the skills and knowledge of PsExec needed to leverage it for lateral movement in a Windows domain.
Course Overview Welcome to Pluralsight and this Red Team Tools course featuring PsExec, the remote administration tool developed and maintained by Mark Russinovich. PsExec is a tool that penetration testers, ethical hackers, and system administrators can use to execute remote processes on Windows machines. PsExec is used for lateral movement within a network, using credentials you already obtained on an already exploited workstation. PsExec is part of the PsTools suite that allows administrators to remotely access Windows machines and gather information or run commands. As the exact part of the name implies, PsExec is used to execute commands or run programs and processes on those remote machines. Come join me as we use PsExec for lateral movement from an exploited host and run commands against a remote Windows machine.