This is runas.exe /netonly .....
replacement to provide support to inject password
- Run executable as administrator
Open MalikP.RunAs.exe.config
and update key
values:
UserName
Domain
Password
Command
UseCustomCommandExecutor
[True|False] - optionalCustomCommandExecutor
CommandArgument
Or run executable with arguments (order is mandatory):
MalikP.RunAs.exe userName domain password "command"
MalikP.RunAs.exe userName domain password "command" UseCustomCommandExecutor CustomCommandExecutor CommandArgument
MalikP.RunAs.exe userName domain password "command"
MalikP.RunAs.exe userName domain password "command" UseCustomCommandExecutor CustomCommandExecutor CommandArgument
Example:
- For powershell
MalikP.RunAs.exe userName domain password "command" True "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-command"
- For powershell v.6
MalikP.RunAs.exe userName domain password "command" True "C:\Program Files\PowerShell\6\pwsh.exe" "-NoProfile -Command"
- For command prompt
MalikP.RunAs.exe userName domain password "command" True "C:\Windows\System32cmd.exe" "/c"
- enccrypt password saved in configuration file