CrackMapExec
# Do this first
cd ~/Crackmapexec
source ~/.zshrc
poetry run crackmapexec -h# If it doesnt work and it returns error just try another user. Because it works
crackmapexec smb 10.129.14.128 --shares -u '' -p ''
crackmapexec smb 10.129.42.197 -u "user" -p "password" --shares
# This will execute spider to department shares
sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 -M spider_plus --share 'Department Shares'# It will display the users in the domain
# You should scan the Domain Controller IP and have a admin priv
crackmapexec smb 10.129.42.198 -u "user" -p "password" --users# It will display the available groups in the domain
sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --groups# It will display the logged users in the domain
sudo crackmapexec smb 172.16.5.5 -u forend -p Klmcargo2 --loggedon-users# This will show the C: drive or D: drive
crackmapexec smb 10.129.42.197 -u "user" -p "password" --disks# This will show Password Policy that could potentially lead to making a password list
crackmapexec smb 10.129.42.197 -u "user" -p "password" --pass-pol
Last updated