Remote Services (T1021)
Using the front door.
1. SMB / Windows Admin Shares (PsExec)
Requires local admin + File & Printer Sharing enabled.
- Shares:
C$(C Drive),ADMIN$(Windows Dir),IPC$(Inter-Process). - PsExec:
- Copy binary to
\\Target\ADMIN$. - Create a Service on Target to run binary.
- Start Service.
- Copy binary to
- Impacket:
psexec.py target.com/user:pass@192.168.1.5
2. Remote Desktop Protocol (RDP)
Interactive GUI access.
- Hijacking: If a user is already logged in (Disconnected session), you can steal their session without a password if you are SYSTEM.
tscon <SessionID> /dest:console
3. Windows Remote Management (WinRM)
PowerShell Remoting. Runs over HTTP (5985) or HTTPS (5986).
- Command:
Enter-PSSession -ComputerName Target - Stealth: Generally cleaner than PsExec (no binary drop).
4. SSH
Common on Linux and Windows servers (OpenSSH).
- Keys: Access via
id_rsa. - Persistence: Add your public key to
authorized_keys.