Authentication Mechanisms - Tools

Authentication Mechanisms - Tools

This document provides an overview of essential tools for testing and interacting with various authentication mechanisms in Windows environments.

CrackMapExec (CME)

CrackMapExec is a post-exploitation tool that helps automate assessment of large Active Directory networks.

Basic Usage

# Test credentials against SMB
crackmapexec smb 10.10.10.10 -u username -p password

# Test credentials against WinRM
crackmapexec winrm 10.10.10.10 -u username -p password

# Test credentials against SSH
crackmapexec ssh 10.10.10.10 -u username -p password

# Test credentials against MSSQL
crackmapexec mssql 10.10.10.10 -u username -p password

Pass-the-Hash

Authentication with Domain

Network Sweeping

Enumeration Functions

Command Execution

Impacket

Impacket is a collection of Python classes for working with network protocols, particularly useful for Windows authentication.

PSExec

WMIExec

SMBExec

Secretsdump

GetNPUsers

GetUserSPNs

Evil-WinRM

Evil-WinRM is a WinRM shell for pentesting/hacking Windows Remote Management.

Basic Usage

Advanced Features

Invoke-TheHash

Invoke-TheHash provides PowerShell functions for performing pass-the-hash attacks with WMI and SMB.

Installation

SMB Command Execution

WMI Command Execution

Mass Command Execution

Lateral Movement Techniques

RDP with Stolen Credentials

DCOM Lateral Movement

Common Troubleshooting

Last updated