π±
π±
π±
π±
CrackMapExec ~ CME WIKI
Public Release - v5.3.0
@byt3bl33d3r
@mpgn_x64
Searchβ¦
Introduction
π₯
News 2022
Changelog
Sponsoring CME
Other Gitbook
Getting Started
Installation
Selecting & Using a Protocol
Target Formats
Using Credentials
Using Kerberos
Using Modules
Database General Usage
π
BloodHound integration
Report bugs or new features
π
Audit Mode
SMB protocol
π
Scan for vulnerabilities
Enumeration
Enumerate hosts
Enumerate null sessions
Enumerate anonymous logon
Enumerate active sessions
Enumerate shares and access
Enumerate disks
Enumerate logged on users
Enumerate domain users
Enumerate users by bruteforcing RID
Enumerate domain groups
Enumerate local groups
Enumerate domain password policy
Enumerate host with SMB signing not required
Password spraying
Authentication
Command execution
Spidering Shares
Get and Put files
Obtaining Credentials
π
Defeating LAPS
π
Spooler, WebDav running ?
LDAP protocol
Authentication
ASREPRoast
Kerberoasting
Unconstrained delegation
Admin Count
Machine Account Quota
Get user descriptions
π
Exploit ESC8 (adcs)
WINRM protocol
Password spraying
Authentication
Command execution
π
Defeating LAPS
MSSQL protocol
Password spraying
Authentication
MSSQL Privesc
MSSQL command
Windows command
SSH protocol
Password spraying
Authentication
Command execution
π
RDP Protocol
Password spraying
Install aardwolf lib
Powered By
GitBook
Enumerate domain users
Enumerate domain users on the remote target
#~ cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --users
Previous
Enumerate logged on users
Next
Enumerate users by bruteforcing RID
Last modified
2yr ago
Copy link