Guide to the TLProxyTester Application

2 min. readlast update: 09.25.2024

Prerequisites 

PsExec Utility: Ensure you have the PsExec utility, which is part of the Sysinternals Suite by Microsoft. You can download it from the Microsoft Sysinternals website: https://docs.microsoft.com/en-us/sysinternals/downloads/psexec 

Steps to Run a Process as a System User 

1. Download and Extract PsExec: 

Download the Sysinternals Suite or just the PsExec utility. Extract the files to a directory, for example, C:\Tools\PsExec. 

2. Open Command Prompt as Administrator: 

Search for cmd in the Windows Start menu. Right-click on Command Prompt and select "Run as administrator". 

3. Navigate to the PsExec Directory: 

In the Command Prompt, navigate to the directory where PsExec is located. For example: 

cd C:\Tools\PsExec 

4. Run the Command to Execute as SYSTEM User: 

Use the following PsExec command to run a process as the SYSTEM user: 

psexec -i -s cmd.exe 

Explanation: 

-i : Run the program so that it interacts with the desktop of the specified session on the specified Windows system. 

-s : Run the process in the Local System account. 

cmd.exe : Starts a new Command Prompt instance as the SYSTEM user. 

5. Verify SYSTEM User: 

A new Command Prompt window should open. 

In the new window, type the following command to verify that you are running as the SYSTEM user: 

whoami 

The output should display NT AUTHORITY\SYSTEM. 

6. Execute the ProxyServerTester: 

In the new SYSTEM Command Prompt window, you can now run any commands or scripts that you need to execute as the SYSTEM user. 

TL Proxy Tester Download

Save TLProxyTester into c:\tools\ folder 

From the System Command Proxy Run c:\tools\tlproxytester.exe 

Important Notes 

Use with Caution: Running commands as the SYSTEM user can have significant impacts on the system. Ensure you know what the commands are doing. 

Antivirus and Security Software: Some antivirus or security software may flag PsExec as a potential threat because it can be used to execute processes with high privileges. 

Was this article helpful?