The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


cme

This is an old revision of the document!


CrackMapExec (CME)

CrackMapExec: “A swiss army knife for pentesting networks…” [ Documentation ]

  • CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks.
  • Built with stealth in mind, CME follows the concept of “Living off the Land”: abusing built-in Active Directory features/protocols to achieve it’s functionality and allowing it to evade most endpoint protection/IDS/IPS solutions.

Supported Protocols: WinRM, MSSQL, SMB, SSH

For help and syntax, just issue the command: crackmapexec

  • crackmapexec -h
  • crackmapexec winrm -h (for help specific to the winrm protocol)
  • crackmapexec smb -h (for help specific to the smb protocol)… etc.

General Syntax: crackmapexec <protocol> <target(s)> -u username -p password

  • Examples:
    • crackmapexec <protocol> <target(s)> -u username -p 'Admin!123@' or…
    • crackmapexec <protocol> <target(s)> -u='username' -p='Admin!123@'

• See the [[https://ptestmethod.readthedocs.io/en/latest/cme.html | documentation] for other help and examples.

cme.1707011819.txt.gz · Last modified: by gman