Security Basics mailing list archives
RE: Executing programs via SYSTEM account (was Re: FW: remote administration via hidden shares)
From: "Pedro RObles" <par13 () psu edu>
Date: Thu, 11 Sep 2003 09:20:16 -0400
It's possible to execute a task, like applying a windows patch inmediatly. We are trying to patch as many computers possible without actually visiting the users. -----Original Message----- From: Birl [mailto:sbirl () temple edu] Sent: Wednesday, September 10, 2003 4:08 PM To: security-basics () securityfocus com Cc: security-basics () securityfocus com Subject: Executing programs via SYSTEM account (was Re: FW: remote administration via hidden shares) As it was written on Sep 8, thus Pedro RObles typed: Pedro: -----Original Message----- Pedro: From: Pedro RObles [mailto:par13 () psu edu] Pedro: Sent: Monday, September 08, 2003 3:03 PM Pedro: To: 'Andreas Schubert' Pedro: Subject: RE: remote administration via hidden shares Pedro: Pedro: Pedro: If I want to execute a script using the system account, can you provide some Pedro: suggestions. I do this quite freqently. Use the 'at' command. Example: I run TaskMgr as the SYSTEM to kill processes that normally wont die via Administrator: at 09:00 /interactive /every:M,W,F TaskMgr.exe (This will launch Task Manager every Monday, Wednesday and Friday at 9am in interactive mode) Thanks Scott Birl http://concept.temple.edu/sysadmin/nt2000/ Senior Systems Administrator Computer Services Temple University ====*====*====*====*====*====*====*====+====*====*====*====*====*====*====*= ===* --------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Captus Networks Are you prepared for the next Sobig & Blaster? - Instantly Stop DoS/DDoS Attacks, Worms & Port Scans - Precisely Define and Implement Network Security - Automatically Control P2P, IM and Spam Traffic FIND OUT NOW - FREE Vulnerability Assessment Toolkit http://www.captusnetworks.com/ads/42.htm ----------------------------------------------------------------------------
Current thread:
- remote administration via hidden shares Bryan Sultanik (Sep 05)
- RE: remote administration via hidden shares Raoul Armfield (Sep 05)
- RE: remote administration via hidden shares Roland Venter (Sep 08)
- Re: remote administration via hidden shares Andreas Schubert (Sep 08)
- Re: remote administration via hidden shares Flávio Pereira (Sep 09)
- Re: remote administration via hidden shares blinder (Sep 10)
- Re: remote administration via hidden shares Flávio Pereira (Sep 09)
- <Possible follow-ups>
- FW: remote administration via hidden shares Pedro RObles (Sep 08)
- Re: remote administration via hidden shares Ansgar Wiechers (Sep 09)
- Executing programs via SYSTEM account (was Re: FW: remote administration via hidden shares) Birl (Sep 10)
- RE: Executing programs via SYSTEM account (was Re: FW: remote administration via hidden shares) Pedro RObles (Sep 11)
- RE: Executing programs via SYSTEM account (was Re: FW: remote administration via hidden shares) Birl (Sep 11)