Write your own metasploit psexec service
Common Information
Type Value
UUID 57764ad7-afc9-4a2a-9405-a7c987ddebfc
Fingerprint 4aa8319a34a40c6
Analysis status DONE
Considered CTI value 0
Text language
Published May 27, 2017, 6:31 p.m.
Added to db Jan. 18, 2023, 9:45 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline danielsauder
Title Write your own metasploit psexec service
Detected Hints/Tags/Attributes 16/1/15
Attributes
Details Type #Events CTI Value
Details Domain 4128
github.com
Details Domain 2
govolution.wordpress.com
Details Domain 10
community.rapid7.com
Details Domain 1
rmn-explores.blogspot.de
Details File 4
status.txt
Details File 50
a.exe
Details File 1
mzrciovg.exe
Details File 1
windows-service-using-c.html
Details Github username 3
govolution
Details IPv4 1
192.168.116.183
Details IPv4 1
192.168.116.142
Details Url 1
https://github.com/govolution/avepoc/blob/master/psexecservice.c
Details Url 1
https://govolution.wordpress.com/2017/02/04/using-tdm-gcc-with-kali-2
Details Url 1
https://community.rapid7.com/community/metasploit/blog/2013/03/09/psexec-demystified
Details Url 1
http://rmn-explores.blogspot.de/2010/09/windows-service-using-c.html