🛠️
Ghoul's Den
WebsiteGhoulsec-Vault
  • Ghoul's Den
  • Index of Tools
  • Index of Links
  • Top Ports
  • Initial Environment Deployment
    • Python3 & Pip Installation
    • Docker 🛳
    • Setting up AWS CLI
    • Msfconsole
    • Netplan configuration & Cloudinit
    • Wordlist Generation - CEWL
    • Apache2 Server
  • Information Gathering & Recon Tools
    • GHDB : Google Hacking Database
    • Sherlock : Social Media Footprinting
    • Nslookup
    • Dig (Domain Information Groper)
    • Recon-ng
    • HTTrack & Web Data Extractor
    • Email Tracker Pro
    • Shodan
    • ARIN Website Registry
  • Network Scanning Enumaration & Vulnerability Detection Tools
    • NMAP & SuperENUM
    • Nmap
      • Target Specification
      • Host Discovery
      • Port Scanning Techniques
      • Port Specification & Scan Order
      • Service Version Detection
      • OS Detection
      • Nmap Scripting Engine
      • Timing & Performance
      • FW / IDS / IPS Evasion
      • Miscellaneous Options
    • Colasoft Packet Builder & Megaping
    • Global Network Inventory
    • LDAP Enumeration > Active Directory Explorer
    • NetBIOS Enumerator
    • SMBEagle
    • RPC Scan
    • Nikto - Web Application Scanner
    • Enum4Linux
  • File Sharing Enumeration
  • Cloud Computing
    • AAD Internals
    • AWS CLI & S3
    • Trivy Scanner
    • S3 Scanner
    • LazyS3
  • Cryptography & stegnography
    • Veracrypt
    • Cryptanalysis Tools
    • Whitespace Cryptography - Snow
    • Creating a Self signed certificate in IIS
    • Steghide & Stegcracker
    • snow
  • Wireless Attacks
    • Aircrack-ng
  • Mobile Attacks
    • PhoneSploit-Pro
    • AndroRAT
    • ADB
  • SQL Injection Vulnerability
    • SQLMap
    • DSSS
  • IOT & OT Hacking
  • Social Engineering
  • Honeypot & IDS
    • Cowrie Honeypot
  • Sniffing & DDos
    • Sniffing
      • Capturing Remote packets using Wireshark
      • Detecting Sniffing using Nmap
    • Denial of Service (Dos & DDos)
      • DDos Protection using DDos Guardian
  • Malware Attacks
  • Password Cracking & Windows exploitation tools
    • Hydra
    • John
    • Hashcat
    • CrackMapExec
    • Impacket
    • Powerview
    • BitsAdmin
    • Rubeus (Kerberoasting) & Winpeas
    • AD-DC Querying
    • mstsc - RDP
  • System hacking & buffer overflow
    • Responder
    • Reverse Shell Generator
    • Clearing Traces
  • Session Hijacking
    • Caido
    • Bettercap
  • Web Servers & Applications
  • Linux Fundamentals
    • Find Command
    • Grep Command
Powered by GitBook
On this page
  1. Password Cracking & Windows exploitation tools

CrackMapExec

CrackMapExec (CME) is a powerful post-exploitation tool designed for penetration testers and red teamers, particularly in Windows environments. It automates tasks like network enumeration, credential validation, and lateral movement across a network using protocols such as SMB, RDP, and WMI. CME allows for remote command execution, pass-the-hash attacks, brute force attempts, and enumeration of active sessions and shares. Its ability to exploit common Windows vulnerabilities makes it invaluable for both offensive and defensive security professionals. While it is essential for penetration testing, it can also pose a security risk if misused by attackers.

Installation :

sudo apt update
sudo apt install crackmapexec

Usage :

1. crackmapexec smb 192.168.1.0/24 -u username -p password
   crackmapexec smb 192.168.1.0/24 -u username -p password --shares
   crackmapexec smb 192.168.1.0/24 -u username -p password --sessions
   crackmapexec smb 192.168.1.0/24 -u username -P /path/to/password-list
   
2. crackmapexec rdp 192.168.1.0/24 -u username -p password
3. crackmapexec wmi 192.168.1.10 -u username -p password -x "ipconfig"
4. crackmapexec winrm 192.168.1.0/24 -u username -p password
5. crackmapexec ldap 192.168.1.10 -u username -p password
6. crackmapexec kerberos 192.168.1.10 -u username -p password
7. crackmapexec rpc 192.168.1.10 -u username -p password
8. crackmapexec ftp 192.168.1.10 -u username -p password
PreviousHashcatNextImpacket

Last updated 4 months ago