CrackMapExec 5.4.0
Home
Discord
Author
Search
⌃
K
Links
💞
A swiss army knife for Pentesting networks
Author
1⃣
Tool
🟢
Linux
Docker
🟢
Parameters
Scan Optimization
🟢
Target Definition - CME
Protocols
1⃣
SMB CrackMapExec
2⃣
LDAP CrackMapExec
🟠
LDAP Modules List
🟠
Extract LDAP users descriptions
🟢
Extract Network Information
🟢
Trust for Delegation
🟢
Admin Count
🟠
Kerberoasting
🟠
ASREPRoast
🟢
LAPS
3⃣
MsSQL CrackMapExec
FTP CrackMapExec
SSH CrackMapExec
RDP CrackMapExec
WinRM CrackMapExec
🥷
Integrations
🔴
BloodHound and CrackMapExec
🔴
DeathStar and CrackMapExec
🥷
Get Reverse Shell
🟢
CME Reverse Shell with Metasploit
🟢
CME Reverse Shell with Empire
🔴
CME Reverse Shell with Covenant
Use Cases
🔥
Scan for SMB Vulnerabilities using CrackMapExec
🔥
Dump Credentials with CrackMapExec
🔥
Anti Virus Bypass with CrackMapExec
🥷
Dump Credentials
Windows Machine
Linux Machine
🥷
Databases
Workspaces
Credentials
Powered By
GitBook
🟢
LAPS
Extract LAPS with crackmapexec
crackmapexec ldap 10.10.10.10 -u rfs -p <Password> --kdcHost <Host> -M laps
crackmapexec smb 10.10.10.10 -u rfs -H '8846f7eaee8fb117ad06bdd830b7586c' -M laps
Previous
ASREPRoast
Next - Protocols
MsSQL CrackMapExec
Last modified
3mo ago