OSCP Certification
HomeAuthorPopLabSecDiscord
  • OSCP Guide - Offensive Security Certified Professional
  • OSCP Retake Policy
  • Company Info
    • Exam Rules
    • Tools NOT Allowed
    • Exam Topics
    • OSCP Exam Guide
  • TryHackMe Rooms
    • Overpass
      • Walkthrough
    • 🔗Vulnversity
      • Walkthrough
    • 💥Kenobi
      • ✅Kenobi
      • Walkthrough
  • VulnHub
    • Brainpan
    • Pinky's Palace v1
    • MrRobot
    • LazySysadmin
    • VulnOsv2
    • Pwnlab_init
    • Lordoftheroot
    • Kioptrix2014
  • HackTheBox Machines
    • Machines
    • Active
    • Bounty
    • Cronos
    • DevOops
    • Silo
    • Devel
    • Conceal
    • Blue
    • Bastard
  • Top Free Courses
    • Page 3
  • Reporting
    • Recommendations
    • Templates
  • Top Youtube Channels
    • John Hammond
  • Hacking Protocols
    • DNS - 53
    • Page
  • Tools Basics
    • Swaks
    • CyberChef
  • Information Gathering
    • pspy
    • Nmap
    • enum4linux
    • BloodHound
    • BloodHound Python
  • Vulnerability Analysis
    • Sparta
    • Nikto
  • Web Application Analysis
    • PayloadsAllTheThings
    • Leaky Paths
    • ysoserial
    • JSON Web Tokens
    • httpx
    • Gobuster
    • ffuf
    • Wfuzz
    • WPScan
  • Password Attacks
    • mimikatz
    • LaZagne
    • hashcat
    • John
    • Kerbrute
    • Patator
    • pypykatz
    • RsaCtfTool
    • CrackMapExec
    • SprayingToolkit
    • Hydra
    • Default Credentials
  • Reverse Engineering
    • dnSpy
    • ghidra
    • AvalonialLSpy
    • GEF
    • Radare2
    • cutter
    • pwndbg
    • peda
    • JD-GUI
  • Exploitation Tools
    • lsassy
    • printspoofer
    • Rubeus
    • pth-toolkit
    • Evil-WinRM
    • PowerSharpPack
    • SharpCollection
  • Post Exploitation
    • PEASS-ng
    • LinEnum
    • Windows Privilege Escalation
    • Priv2Admin
    • PowerView
    • powercat
    • Impacket
    • GTFOBins
    • WADComs
    • RunasCs
    • scavenger
    • Sherlock
    • WESNG
    • JAWS
    • Watson
    • LOLBAS
Powered by GitBook
On this page
  • Overview
  • Key Features
  • Installation
  • Usage
  • Conclusion

Was this helpful?

  1. Password Attacks

CrackMapExec

Dive into our detailed article on CrackMapExec, a Swiss-army knife tool for penetration testing networks. Learn all about its uses, functionalities, and importance in ensuring cyber security.

Overview

CrackMapExec (CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with Python, it provides a versatile toolkit for network administrators to test network defenses by simulating an attacker's actions.

Key Features

  • Multiprotocol Support: CrackMapExec supports various protocols such as SMB, SSH, WinRM, and more.

  • Modular Design: Allows users to extend its capabilities using custom-written modules.

  • Credential Harvesting: Capable of harvesting credentials across networks when run with appropriate permissions.

  • Lateral Movement: Facilitates the spread of an attack across the network from a single entry point.

Installation

To install CrackMapExec on your system, you can use pip:

pip install crackmapexec

Alternatively, you can clone the Git repository and install it manually:

git clone https://github.com/byt3bl33d3r/CrackMapExec
cd CrackMapExec
python setup.py install

Usage

After installation, you can start using CrackMapExec with the following command syntax:

crackmapexec [options] [ip/range/CIDR]

Replace [options] with the specific command-line options you want to use and [ip/range/CIDR] with the target IP address, IP range, or CIDR notation.

Conclusion

CrackMapExec is a powerful tool for systems administrators, red teamers, and cybersecurity professionals, offering a swift way to identify and exploit weaknesses within an AD environment.

Always ensure to use of such tools ethically and within the boundaries of the law.

PreviousRsaCtfToolNextSprayingToolkit

Last updated 1 year ago

Was this helpful?

GitHub - byt3bl33d3r/CrackMapExec: A swiss army knife for pentesting networksGitHub
Logo