🔱
🔱
🔱
🔱
CrackMapExec ~ CME WIKI
Public Release - v5.4.1
@byt3bl33d3r
@mpgn_x64
Search
⌃K
Links
Introduction
🔥
News 2022
Changelog
Sponsoring CME
Other Gitbook
Getting Started
Installation
Selecting & Using a Protocol
Target Formats
Using Credentials
Using Kerberos
Using Modules
Database General Usage
BloodHound integration
Report bugs or new features
Audit Mode
SMB protocol
Scan for vulnerabilities
Enumeration
Password spraying
Authentication
Command execution
Spidering Shares
Get and Put files
💲
Obtaining Credentials
Dump SAM
Dump LSA
🆕
Dump NTDS.dit
Dump LSASS
Dump WIFI password
🆕
Dump KeePass
💲
Dump DPAPI
Defeating LAPS
Spooler, WebDav running ?
Steal Microsoft Teams cookies
LDAP protocol
Authentication
ASREPRoast
Find domain SID
Kerberoasting
Unconstrained delegation
Admin Count
Machine Account Quota
Get user descriptions
🆕
Dump gMSA
Exploit ESC8 (adcs)
Extract subnet
Check LDAP signing
Read DACL right
💲
Extract gMSA secrets
💲
Bloodhound Ingestor
WINRM protocol
Password spraying
Authentication
Command execution
Defeating LAPS
MSSQL protocol
Password spraying
Authentication
MSSQL Privesc
MSSQL command
MSSQL upload/download
Windows command
SSH protocol
Password spraying
Authentication
Command execution
FTP protocol
Password spraying
RDP Protocol
Password spraying
Screenshot (connected)
🆕
Screenshot without NLA (not connected)
Powered By
GitBook
💲
Obtaining Credentials
The following examples use a username and plaintext password although user/hash combos work as well.
Dump SAM
Dump LSA
🆕
Dump NTDS.dit
Dump LSASS
💲
Dump DPAPI
SMB protocol - Previous
Get and Put files
Next
Dump SAM
Last modified
2mo ago