You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of "Living off the Land": abusing built-in Active Directory features/protocols to achieve it's functionality and allowing it to evade most endpoint protection/IDS/IPS solutions.
77
+
78
+
CME makes heavy use of the Impacket library (developed by @asolino) and the PowerSploit Toolkit (developed by @mattifestation) for working with network protocols and performing a variety of post-exploitation techniques.
79
+
80
+
Although meant to be used primarily for offensive purposes (e.g. red teams), CME can be used by blue teams as well to assess account privileges, find possible misconfigurations and simulate attack scenarios.
smbclient is a client that can 'talk' to an SMB/CIFS server. It offers an interface similar to that of the ftp program. Operations include things like getting files from the server to the local machine, putting files from the local machine to the server, retrieving directory information from the server and so on.
75
89
smbclient -L //<IP>
76
90
enumerate shares(users) on a server
77
91
smbclient //<IP>/<shares>
@@ -85,7 +99,9 @@ Mount to host OS instead of using smbclient:
SMBMap allows users to enumerate samba share drives across an entire domain. List share drives, drive permissions, share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. This tool was designed with pen testing in mind, and is intended to simplify searching for potentially sensitive data across large networks.
Reads target specifications from the file specified rather than from the command line. The file should contain a list separated by newlines.
578
+
579
+
-u [TARGET]
580
+
Target username.
581
+
582
+
-U [FILE]
583
+
Reads target usernames from the file specified rather than from the command line. The file should contain a list separated by newlines.
584
+
585
+
-p [TARGET]
586
+
Target password.
587
+
588
+
-P [FILE]
589
+
Reads target passwords from the file specified rather than from the command line. The file should contain a list separated by newlines.
590
+
591
+
-C [FILE]
592
+
File containing combo entries. Combo files are colon separated and in the following format: host:user:password. If any of the three fields are left empty, the respective information should be provided either as a single global value or as a list in a file.
593
+
594
+
-O [FILE]
595
+
File to append log information to. Medusa will log all accounts credentials found to be valid or cause an unknown error. It will also log the start and stop times of an audit, along with the calling parameters.
596
+
597
+
-e [n/s/ns]
598
+
Additional password checks ([n] No Password, [s] Password = Username). If both options are being used, they should be specified together ("-e ns"). If only a single option is being called use either "-e n" or "-e s".
599
+
600
+
-M [TEXT]
601
+
Name of the module to execute (without the .mod extension).
602
+
603
+
-m [TEXT]
604
+
Parameter to pass to the module. This can be passed multiple times with a different parameter each time and they will all be sent to the module (i.e. -m Param1 -m Param2, etc.)
605
+
606
+
-d
607
+
Dump all known modules.
608
+
609
+
-n [NUM]
610
+
Use for non-default TCP port number.
611
+
612
+
-s
613
+
Enable SSL.
614
+
615
+
-g [NUM]
616
+
Give up after trying to connect for NUM seconds (default 3).
617
+
618
+
-r [NUM]
619
+
Sleep NUM seconds between retry attempts (default 3).
620
+
621
+
-R [NUM]
622
+
Attempt NUM retries before giving up. The total number of attempts will be NUM + 1.
623
+
624
+
625
+
-t [NUM]
626
+
Total number of logins to be tested concurrently. It should be noted that rougly t x T threads could be running at any one time. 381 appears to be the limit on my fairly boring Gentoo Linux host.
627
+
628
+
-T [NUM]
629
+
Total number of hosts to be tested concurrently.
630
+
631
+
-L
632
+
Parallelize logins using one username per thread. The default is to process the entire username before proceeding.
633
+
634
+
-f
635
+
Stop scanning host after first valid username/password found.
636
+
637
+
-F
638
+
Stop audit after first valid username/password found on any host.
639
+
640
+
-b
641
+
Suppress startup banner
642
+
643
+
-q
644
+
Display module's usage information. This should be used in conjunction with the "-M" option. For example, "medusa -M smbnt -q".
645
+
646
+
-v [NUM]
647
+
Verbose level [0 - 6 (more)]. All messages at or below the specified level will be displayed. The default level is 5.
648
+
649
+
-w [NUM]
650
+
Error debug level [0 - 10 (more)]. All messages at or below the specified level will be displayed. The default level is 5.
651
+
652
+
-V
653
+
Display version
654
+
655
+
Available Medusa Modules:
656
+
657
+
afp.mod : Brute force module for AFP sessions
658
+
cvs.mod : Brute force module for CVS sessions
659
+
ftp.mod : Brute force module for FTP/FTPS sessions
660
+
http.mod : Brute force module for HTTP
661
+
imap.mod : Brute force module for IMAP sessions
662
+
mssql.mod : Brute force module for MSSQL sessions
663
+
mysql.mod : Brute force module for MySQL sessions
664
+
nntp.mod : Brute force module for NNTP sessions
665
+
pcanywhere.mod : Brute force module for PcAnywhere sessions
666
+
pop3.mod : Brute force module for POP3 sessions
667
+
postgres.mod : Brute force module for PostgreSQL sessions
668
+
rdp.mod : Brute force module for RDP (Microsoft Terminal Server) sessions
669
+
rexec.mod : Brute force module for REXEC sessions
670
+
rlogin.mod : Brute force module for RLOGIN sessions
671
+
rsh.mod : Brute force module for RSH sessions
672
+
smbnt.mod : Brute force module for SMB (LM/NTLM/LMv2/NTLMv2) sessions
673
+
smtp-vrfy.mod : Brute force module for verifying SMTP accounts (VRFY/EXPN/RCPT TO)
674
+
smtp.mod : Brute force module for SMTP Authentication with TLS
675
+
snmp.mod : Brute force module for SNMP Community Strings
676
+
ssh.mod : Brute force module for SSH v2 sessions
677
+
svn.mod : Brute force module for Subversion sessions
678
+
telnet.mod : Brute force module for telnet sessions
679
+
vmauthd.mod : Brute force module for the VMware Authentication Daemon
0 commit comments