-i Runs the tool interactively
-s Runs to tool as the SYSTEM user account.
NOTE: The above are not necessary; use as desired to run a cmd prompt from the admin system on the user's system. It will be just like running a cmd prompt while on the user's system, but invisible to the user.
DNS testing
ping
-a
nslookup
Network testing
telnet to ports
Check running processes
tasklist
Check running services
sc query state= all | findstr "DISPLAY_NAME STATE"
C:\> SC query messenger | FIND "STATE" | FIND "STOPPED"
C:\> SC query messenger | FIND "STATE" | FIND "STOPPED"
sc query
Kill processes:
taskkill /IM kboxclient.exe, kinstallersetup.exe, etc
Start/Stop services:
net start kboxsmmp
net stop kboxsmmp
Run silent install of programs
kinstallersetup.exe -server=kbox -display_mode=silent
Map a drive:
net use x: \\servername\servershare
These tools can be useful when troubleshooting a remote system where the end user is using the system.
psexec \\marklap cmd
Executes IpConfig on the remote system with the /all switch, and displays the resulting output locally.
psexec \\marklap ipconfig /all
Copies the program test.exe to the remote system and executes it interactively:
psexec \\marklap -c test.exe
Specify the full path to a program that is already installed on a remote system if its not on the system's path:
psexec \\marklap c:\bin\test.exe
Run Regedit interactively in the System account to view the contents of the SAM and SECURITY keys:
psexec -i -d -s c:\windows\regedit.exe
Run cmd interactively in the System account to make it easy running other processes i.e. kdeploy.exe or runkbot.exe etc.:
psexec -i -d -s cmd
Run Internet Explorer as with limited-user privileges use this command:
psexec -l -d "c:\program files\internet explorer\iexplore.exe"
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center