Skip to content

Latest commit

 

History

History
149 lines (139 loc) · 9.5 KB

remote.md

File metadata and controls

149 lines (139 loc) · 9.5 KB
<script type="text/javascript"> $(document).ready(function() { $('div.view').hide(); $('div.slide').click(function() { $(this).next('div.view').slideToggle('fast'); return false; }); }); </script>

Windows Remote Access Commands

Commands that move data and files between systems on a network and are usually executed from the context of the cmd.exe or command.exe prompt.

Miscellaneous

dir

  • Command with arguments: dir \\[computername|ip]\share
  • Description: Must have token to the remote system. See net use below to establish such a connection. Displays the contents of the remote computer's share.
  • Output:
    • Windows 2008:
C:\Users\johndoe>dir \\192.168.10.34\c$
 Volume in drive \\192.168.10.34\c$ has no label.
 Volume Serial Number is 1A09-5F16<br>
 Directory of \\192.168.10.34\c$<br>
09/18/2006  05:43 PM                24 autoexec.bat
09/18/2006  05:43 PM                10 config.sys
01/19/2008  05:40 AM    <DIR>          PerfLogs
10/08/2013  07:36 PM    <DIR>          Program Files
10/23/2013  08:20 PM    <DIR>          temp
10/10/2013  08:59 PM    <DIR>          Users
10/23/2013  08:38 PM    <DIR>          Windows
               2 File(s)             34 bytes
               5 Dir(s)  33,316,192,256 bytes free</code></div> 

qprocess

  • Command with arguments: qprocess * [/SERVER:computername]
  • Description: Shows information about processes locally or remotely if you provide the computername or IP.
  • Output:
    • Windows 2008:
C:\Users\johndoe>qprocess * /SERVER:192.168.1.2
 USERNAME              SESSIONNAME         ID    PID  IMAGE
 (unknown)             services             0      0
 (unknown)             services             0      4  system
 (unknown)             services             0    268  smss.exe
 (unknown)             services             0    356  csrss.exe
 (unknown)             services             0    408  wininit.exe
>(unknown)             console              1    420  csrss.exe
>(unknown)             console              1    460  winlogon.exe
 (unknown)             services             0    516  services.exe
>johndoe               console              1   1584  dwm.exe
>johndoe               console              1   1600  explorer.exe
 (unknown)             services             0   1708  vmtoolsd.exe
>johndoe               console              1   1936  vmwaretray.exe
>johndoe               console              1   1944  vmtoolsd.exe
 (unknown)             services             0    316  tpautoconnsv...
>johndoe               console              1   1716  tpautoconnec...
>johndoe               console              1   1680  conhost.exe
 (unknown)             services             0   1984  searchindexe...
 (unknown)             services             0   2076  msdtc.exe
 (unknown)             services             0   2844  svchost.exe
 (unknown)             services             0   2920  sppsvc.exe
 (unknown)             services             0   2976  svchost.exe
>johndoe               console              1   3576  cmd.exe
>johndoe               console              1   3540  conhost.exe
>johndoe               console              1   2340  cmd.exe
>johndoe               console              1   1560  conhost.exe
>johndoe               console              1   3616  qprocess.exe</code></div> 

qwinsta

  • Command with arguments: qwinsta [/SERVER:computername]
  • Description: Shows information about Remote Desktop Sessions locally or remotely if you provide the computername or IP.
  • Output:
    • Windows 2008:
SESSIONNAME       USERNAME                 ID  STATE   TYPE        DEVICE
 services                                    0  Disc
>console           johndoe                   1  Active
 rdp-tcp                                 65536  Listen 

psexec

  • Command with arguments: psexec \\[computername|IP] [cmd]
  • Description: The psexec tool executes processes on other systems over a network. Most systems now disable the "clipbook" which psexec required. According to Val Smith's and Colin Ames' BlackHat 2008 presentation (page 50), you can re-enable the sub-systems needed to use psexec using the sc commands below.
c:\> net use \\[computername|IP]\ipc$ username /user:password
c:\> sc \\[computername|IP] config netdde start= auto
c:\> sc \\[computername|IP] config netddedsdm start= auto
c:\> sc \\[computername|IP] config clipsrv start= auto
c:\> sc \\[computername|IP] start netdde
c:\> sc \\[computername|IP] start netddedsdm
c:\> sc \\[computername|IP] start clipsrv
  • Example Command: psexec \\1.1.1.1 ipconfig /all would retrieve the IP settings for the 1.1.1.1 system.

tasklist

  • Command with arguments: tasklist /v /s [computername|IP]
  • Description: Retrieve the current running processes from the remote system. Microsoft manual.
  • Output:
    • Windows 7: Output Abridged
C:\Windows\system32>tasklist /V /S 192.168.10.34
Type the password for WIN-V32NJ7H3AQE\johndoe:************************

Image Name                     PID Session Name        Session#    Mem Usage Status          User Name                                              CPU Time Window Title
========================= ======== ================ =========== ============ =============== ================================================== ============ ========================================================================
System Idle Process              0 Services                   0         24 K Unknown         NT AUTHORITY\SYSTEM                                   257:06:03 N/A
System                           4 Services                   0      7,908 K Unknown         N/A                                                     0:55:12 N/A
smss.exe                       380 Services                   0      1,228 K Unknown         N/A                                                     0:00:00 N/A
csrss.exe                      604 Services                   0      6,800 K Unknown         N/A                                                     0:00:18 N/A
wininit.exe                    724 Services                   0      6,704 K Unknown         N/A                                                     0:00:09 N/A
csrss.exe                      744 Console                    1    113,708 K Running         N/A                                                     0:01:54 N/A
services.exe                   788 Services                   0     61,240 K Unknown         N/A                                                     0:13:09 N/A
lsass.exe                      796 Services                   0     63,908 K Unknown         N/A                                                     0:05:24 N/A
lsm.exe                        804 Services                   0      9,668 K Unknown         N/A                                                     0:00:15 N/A
svchost.exe                    936 Services                   0     60,764 K Unknown         N/A                                                     3:16:56 N/A
winlogon.exe                  1004 Console                    1     48,536 K Unknown         N/A                                                     0:00:09 N/A
svchost.exe                    396 Services                   0     56,520 K Unknown         N/A                                                     0:01:11 N/A
btservice.exe                  600 Services                   0     14,720 K Unknown         N/A                                                     0:01:03 N/A
svchost.exe                    868 Services                   0     94,956 K Unknown         N/A                                                     0:23:14 N/A
svchost.exe                   1032 Services                   0    400,948 K Unknown         N/A                                                     0:36:07 N/A
svchost.exe                   1072 Services                   0     86,092 K Unknown         N/A                             

net

net time

  • Command with arguments: net time \\[computername|ip]
  • Description: Display the time from the remote system.
  • Output:
    • **Windows 2008:** Show/Hide
      C:\Users\johndoe>net time \\192.168.10.34

Current time at \192.168.10.34 is 10/23/2013 9:03:04 PM
The command completed successfully.

net use

  • Command with arguments: net use \\[computername|ip] [/user:DOMAIN\USERNAME] [password]
  • Description: Create a connection to the remote computer. This maps IPC$ which does not show up as a drive but allows you to access the remote system as the current user. If the user you launch the command as is not valid on the remote system you will need to specify a valid DOMAIN\USER and PASSWORD. This is useful when you have credentials from somewhere and wish to use them but do not have an active token on a machine you have a session on.
  • Output:
    • Windows 2008:
C:\Users\johndoe>net use \\192.168.10.34 /user:lab\johndoe
The password or user name is invalid for \\192.168.10.34.<br>
Enter the password for 'lab\johndoe' to connect to '192.168.10.34':
The command completed successfully.