PowerShell and PsExec Remote Call

       PsExec是微软发布的工具之一,用于远程执行。PowerShell拥有Invoke-Commond来远程执行,并且很方便地返回远程执行的结果,但是对于有UI的session交互的远程调用,不方便控制UI所在的session,但是PsExec就可以解决这个问题,下面是PsExec的官方Doc:

Introduction

Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs on remote systems, but they can be a pain to set up and require that you install client software on the remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.

Note: some anti-virus scanners report that one or more of the tools are infected with a "remote admin" virus. None of the PsTools contain viruses, but they have been used by viruses, which is why they trigger virus notifications.

Installation

Just copy PsExec onto your executable path. Typing "psexec" displays its usage syntax.

Using PsExec

See the July 2004 issue of Windows IT Pro Magazine for Mark's article that covers advanced usage of PsExec.

Usage: psexec [\\computer[,computer2[,...] | @file]][-u user [-p psswd][-n s][-r servicename][-h][-l][-s|-e][-x][-i [session]][-c [-f|-v]][-w directory][-d][-<priority>][-a n,n,...] cmd [arguments]

-aSeparate processors on which the application can run with commas where 1 is the lowest numbered CPU. For example, to run the application on CPU 2 and CPU 4, enter: "-a 2,4"
-cCopy the specified program to the remote system for execution. If you omit this option the application must be in the system path on the remote system.
-dDon't wait for process to terminate (non-interactive).
-eDoes not load the specified account’s profile.
-fCopy the specified program even if the file already exists on the remote system.
-iRun the program so that it interacts with the desktop of the specified session on the remote system. If no session is specified the process runs in the console session.
-hIf the target system is Vista or higher, has the process run with the account's elevated token, if available.
-lRun process as limited user (strips the Administrators group and allows only privileges assigned to the Users group). On Windows Vista the process runs with Low Integrity.
-nSpecifies timeout in seconds connecting to remote computers.
-pSpecifies optional password for user name. If you omit this you will be prompted to enter a hidden password.
-rSpecifies the name of the remote service to create or interact with.
-sRun the remote process in the System account.
-uSpecifies optional user name for login to remote computer.
-vCopy the specified file only if it has a higher version number or is newer on than the one on the remote system.
-wSet the working directory of the process (relative to remote computer).
-xDisplay the UI on the Winlogon secure desktop (local system only).
-prioritySpecifies -low, -belownormal, -abovenormal, -high or -realtime to run the process at a different priority. Use -background to run at low memory and I/O priority on Vista.
computerDirect PsExec to run the application on the remote computer or computers specified. If you omit the computer name, PsExec runs the application on the local system, and if you specify a wildcard (\\*), PsExec runs the command on all computers in the current domain.
@filePsExec will execute the command on each of the computers listed in the file.
cmdName of application to execute.
argumentsArguments to pass (note that file paths must be absolute paths on the target system).
-accepteulaThis flag suppresses the display of the license dialog.

You can enclose applications that have spaces in their name with quotation marks e.g.

psexec \\marklap"c:\long name app.exe"

Input is only passed to the remote system when you press the Enter key. Typing Ctrl-C terminates the remote process.

If you omit a user name, the process will run in the context of your account on the remote system, but will not have access to network resources (because it is impersonating). Specify a valid user name in the Domain\User syntax if the remote process requires access to network resources or to run in a different account. Note that the password and command are encrypted in transit to the remote system.

Error codes returned by PsExec are specific to the applications you execute, not PsExec.

Examples

This article I wrote describes how PsExec works and gives tips on how to use it:

The following command launches an interactive command prompt on \\marklap:

psexec \\marklap cmd

This command executes IpConfig on the remote system with the /all switch, and displays the resulting output locally:

psexec \\marklap ipconfig /all

This command copies the program test.exe to the remote system and executes it interactively:

psexec \\marklap -c test.exe

Specify the full path to a program that is already installed on a remote system if its not on the system's path:

psexec \\marklap c:\bin\test.exe

Run Regedit interactively in the System account to view the contents of the SAM and SECURITY keys::

psexec -i -d -s c:\windows\regedit.exe

To run Internet Explorer as with limited-user privileges use this command:

psexec -l -d "c:\program files\internet explorer\iexplore.exe"

下载地址:http://technet.microsoft.com/en-us/sysinternals/bb897553.aspx

下面是powershell与psExec结合做远程调用的例子

[string]$LogPath = "E:\PowerShellScript\Log\Log.txt"
[string]$PsExecPath = "D:\PSTools\PSTools"
[string]$AgentPath = "E:\PowerShellScript"
# Auth:Justin
# Date:2014-10-24
# Desc:To get random number
function RemoteAgent($Action,$ActionInput)
{
	try
	{
		PUSHD $PsExecPath
		$Arguments = $Action,$ActionInput
		#PsExec -d powershell "$AgentPath\PsAgent.ps1 $Arguments"
		PsExec -d powershell "$AgentPath\PsAgent.ps1 $Arguments"
		POPD
	}
	catch
	{
		Write-Host "Exception."
	}	
}
psAgent.ps1

<span style="font-family:Microsoft YaHei;">param
(
	[string]$Action,
	[object]$ActioInput
)

function DoWork
{
	#Write-Host $Action
	#Write-Host $ActioInput
	switch($Action)
	{
		"PrintWelcome"
		{
			PrintWelcome $ActioInput
		}
		"WriteLetter"
		{
			WriteLetter $ActioInput
		}
		"Squre"
		{
			Squre $ActioInput
		}
	}
}

function PrintWelcome($Name)
{
	Write-Host "Hello "$Name", Welcome to School!"
}

function WriteLetter($Receiver)
{
	Write-Host "Hi $Receiver!" -ForegroundColor WHITE
	Write-Host "I miss you so much..." -ForegroundColor WHITE
}

function Squre($Num)
{
	return $Num*$Num
}

Write-Host "---The function has finished---" -ForegroundColor Green
DoWork
Write-Host "---The function has finished---" -ForegroundColor Green
Write-Host "Please press ENTER to exit."
Read-Host </span>
下次介绍Invoke-Commond的详细用法

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值