CrackMapExec

# Do this first 
cd ~/Crackmapexec
source ~/.zshrc
poetry run crackmapexec -h
# If it doesnt work and it returns error just try another user. Because it works
crackmapexec smb 10.129.14.128 --shares -u '' -p ''
crackmapexec smb 10.129.42.197 -u "user" -p "password" --shares

# This will execute spider to department shares
sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 -M spider_plus --share 'Department Shares'
# It will display the users in the domain 
# You should scan the Domain Controller IP and have a admin priv
crackmapexec smb 10.129.42.198 -u "user" -p "password" --users
# It will display the available groups in the domain
sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --groups
# It will display the logged users in the domain
sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --loggedon-users
# This will show the C: drive or D: drive
crackmapexec smb 10.129.42.197 -u "user" -p "password" --disks
# This will show Password Policy that could potentially lead to making a password list
crackmapexec smb 10.129.42.197 -u "user" -p "password" --pass-pol

Last updated