🔱
🔱
🔱
🔱
CrackMapExec ~ CME WIKI
Public Release - v5.4.1
@byt3bl33d3r
@mpgn_x64
Search…
⌃K
Links
Introduction
🔥
News 2022
Changelog
Sponsoring CME
Other Gitbook
Getting Started
Installation
Selecting & Using a Protocol
Target Formats
Using Credentials
Using Kerberos
Using Modules
Database General Usage
BloodHound integration
Report bugs or new features
Audit Mode
SMB protocol
Scan for vulnerabilities
Enumeration
Password spraying
Authentication
Command execution
Spidering Shares
Get and Put files
Obtaining Credentials
Dump SAM
Dump LSA
🆕
Dump NTDS.dit
Dump LSASS
Dump WIFI password
🆕
Dump KeePass
💲
Dump DPAPI
Defeating LAPS
Spooler, WebDav running ?
Steal Microsoft Teams cookies
LDAP protocol
Authentication
ASREPRoast
Find domain SID
Kerberoasting
Unconstrained delegation
Admin Count
Machine Account Quota
Get user descriptions
🆕
Dump gMSA
Exploit ESC8 (adcs)
Extract subnet
Check LDAP signing
Read DACL right
💲
Extract gMSA secrets
💲
Bloodhound Ingestor
WINRM protocol
Password spraying
Authentication
Command execution
Defeating LAPS
MSSQL protocol
Password spraying
Authentication
MSSQL Privesc
MSSQL command
MSSQL upload/download
Windows command
SSH protocol
Password spraying
Authentication
Command execution
FTP protocol
Password spraying
RDP Protocol
Password spraying
Screenshot (connected)
🆕
Screenshot without NLA (not connected)
Powered By
GitBook
Dump WIFI password
Get the WIFI password register in Windows
You need at least local admin privilege on the remote target, use option
--local-auth
if your user is a local account
cme smb <ip> -u user -p pass -M wireless
Previous
Dump LSASS
Next
Dump KeePass
Last modified
1yr ago