Tuesday, February 25, 2020
- calls.csv
- customers.csv
- customer_churn.ipynb
| function Invoke-PsExec { | |
| <# | |
| .SYNOPSIS | |
| This function is a rough port of Metasploit's psexec functionality. | |
| It utilizes Windows API calls to open up the service manager on | |
| a remote machine, creates/run a service with an associated binary | |
| path or command, and then cleans everything up. | |
| Either a -Command or a custom -ServiceEXE can be specified. | |
| For -Commands, a -ResultsFile can also be specified to retrieve the |
| input { | |
| tcp { | |
| port => 5000 | |
| type => syslog | |
| } | |
| udp { | |
| port => 5000 | |
| type => syslog | |
| } | |
| } |
Tuesday, February 25, 2020