Hi Guys,
From what I understand of the current version of BatchPatch that when you specify credentials for a remote system PSEXEC passes the password in plain text. Now while I undersstand this is a limitation of PSEXEC itself our security guys are throwing a hissy fit (understandably)
But… Having done a little research I found this article http://digital-forensics.sans.org/blog/2010/06/01/protecting-admin-passwords-remote-response-forensics/
I explains how to get round this limitation by mapping to the IPC$ share of the remote system before executing the task.
What are the possibilities of getting this built into a future version of the software?
Taa,
Tony.