Remote control

Some tools can give an attacker the ability to remotely control a host over the network. Most tools for remotely controlling a host, including metasploit and powersploit scripts are typically used by system administrators and pentesters and are not just “hacking tools”.

For remote code execution using:

  • PowerShell, remoting must be enabled for it and user credentials must have been obtained.
  • WMI, the WMI service must be running, DCOM ports must be allowed through the firewall, and administrative credentials must have been obtained.
  • PsExec, SMB must be allowed through the firewall and user credentials must have been obtained.
  • an exploit, one needs remotely exploitable software and a sufficiently engineered exploit capable of bypassing all enabled exploit mitigations.
  • a command injection vulnerability, a vulnerable service must exist that fails to sanitize potentially malicious user input and consequently executes the user input.