🔱
🔱
🔱
🔱
CrackMapExec ~ CME WIKI
Public Release - v5.4.1
@byt3bl33d3r
@mpgn_x64
Search…
⌃K
Links
Introduction
🔥
News 2022
Changelog
Sponsoring CME
Other Gitbook
Getting Started
Installation
Selecting & Using a Protocol
Target Formats
Using Credentials
🆕
Using Kerberos
Using Modules
🆕
Database General Usage
🆕
BloodHound integration
Report bugs or new features
🆕
Audit Mode
SMB protocol
🆕
Scan for vulnerabilities
Enumeration
Password spraying
Authentication
Command execution
Spidering Shares
Get and Put files
Obtaining Credentials
Dump SAM
Dump LSA
🆕
Dump NTDS.dit
Dump LSASS
Dump WIFI password
🆕
Dump KeePass
🆕
Defeating LAPS
🆕
Spooler, WebDav running ?
🆕
Steal Microsoft Teams cookies
LDAP protocol
🆕
Authentication
ASREPRoast
🆕
Find domain SID
Kerberoasting
Unconstrained delegation
Admin Count
Machine Account Quota
Get user descriptions
🆕
Dump gMSA
🆕
Exploit ESC8 (adcs)
🆕
Extract subnet
🆕
Check LDAP signing
🆕
Read DACL right
💲
Extract gMSA secrets
WINRM protocol
Password spraying
Authentication
Command execution
🆕
Defeating LAPS
MSSQL protocol
Password spraying
Authentication
MSSQL Privesc
MSSQL command
🆕
MSSQL upload/download
Windows command
SSH protocol
Password spraying
Authentication
Command execution
FTP protocol
🆕
Password spraying
RDP Protocol
Password spraying
Screenshot (connected)
🆕
Screenshot without NLA (not connected)
Powered By
GitBook
Obtaining Credentials
The following examples use a username and plaintext password although user/hash combos work as well.
Dump SAM
Dump LSA
🆕
Dump NTDS.dit
Dump LSASS
SMB protocol - Previous
Get and Put files
Next
Dump SAM
Last modified
2yr ago