bfog
-
Posts
4 -
Joined
-
Last visited
Posts posted by bfog
-
-
Just now, bfog said:
I did check the logs, no blocked app.
the command to run the script requires admin privileges and looks like that: psexec -s Wipe-Script-Win10.ps1
When running cmd as admin the command works as it should. is there any way to run cmd with elevated rights from ecmd?
Also I am not running psexec remotely - I am placing it in c:\windows\temp via curl with an ecmd task
-
4 minutes ago, itman said:
Since remote execution of psexec is near the top of remote execution malware attacks, I assume; and hopefully, Eset is blocking its execution.
Have you checked your Eset logs for such a blocked entry?
I did check the logs, no blocked app.
the command to run the script requires admin privileges and looks like that: psexec -s Wipe-Script-Win10.ps1
When running cmd as admin the command works as it should. is there any way to run cmd with elevated rights from ecmd?
-
Hi there
It's been a week since I started trying to copy psexec to [c:\windows\temp] and call it with elevated rights to start a ps script to factory reset Windows 10 remotely. Atm I can't run "psexec -s Wipe-Script-Windows10.ps1" without having admin rights in cmd. Did anyone else had luck regarding this or has an even better solution? The wipe-script works fine btw
thank you for your help
cheers
Wipe Windows 10 with Run Command Task
in ESET PROTECT On-prem (Remote Management)
Posted
That actually does work... thank you very much!