cme
This is an old revision of the document!
CrackMapExec (CME)
CrackMapExec: “A swiss army knife for pentesting networks…”
- CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks.
- Built with stealth in mind, CME follows the concept of “Living off the Land”: abusing built-in Active Directory features/protocols to achieve it’s functionality and allowing it to evade most endpoint protection/IDS/IPS solutions.
Supported Protocols: WinRM, MSSQL, SMB, SSH
For help and syntax, just issue the command: crackmapexec
or…
crackmapexec -h crackmapexec winrm -h # (for help specific to the winrm protocol) crackmapexec smb -h # (for help specific to the smb protocol)
General Syntax:
crackmapexec <protocol> <target(s)> -u username -p password
Examples:
crackmapexec <protocol> <target(s)> -u username -p 'Admin!123@' # or... crackmapexec <protocol> <target(s)> -u='username' -p='Admin!123@'
See the documentation for other help and examples.
cme.1707012035.txt.gz · Last modified: by gman