Crackmapexec
Crackmapexec
winrm options
Command Execution --verbose -h, --help
options
--no-output enable verbose output show this help message and exit
--local-auth -h, --help
do not retrieve command output --darrell -t THREADS
authenticate locally to each target show this help message and exit
-x COMMAND give Darrell a hand set how many concurrent threads to use (default: 100)
-d DOMAIN -id CRED_ID [CRED_ID ...]
execute the specified command --jitter INTERVAL --timeout TIMEOUT
domain to authenticate to database credential ID(s) to use for authentication
-X PS_COMMAND sets a random delay between each connection (default: max timeout in seconds of each thread (default: None)
--laps [LAPS] -u USERNAME [USERNAME ...] None)
execute the specified PowerShell command
LAPS authentification username(s) or file(s) containing usernames
Enumerate enabled domain users LDAP port (default: 389) password(s) or file(s) containing passwords --enabled --lsa
--groups --continue-on-success -k, --kerberos Only dump enabled targets from DC dump LSA secrets from target systems
Enumerate domain groups continues authentication attempts even after successes Use Kerberos authentication --ntds [{drsuapi,vss}]
--gmsa --no-bruteforce --use-kcache dump the NTDS.dit from target DCs using the specifed
method (default: drsuapi)
Enumerate GMSA passwords No spray when using file for username and password Use Kerberos authentication from ccache file
(user1 => password1, user2 => password2 (KRB5CCNAME)
--get-sid Mapping/Enumeration
-H HASH [HASH ...], --hash HASH [HASH ...] --export EXPORT [EXPORT ...]
Get domain sid --wmi-namespace NAMESPACE --shares
NTLM hash(es) or file(s) containing NTLM hashes Export result into a file, probably buggy
WMI Namespace (default: root\cimv2) enumerate shares and access
--connectback-host CHOST --aesKey AESKEY [AESKEY ...]
--wmi QUERY --sessions
IP for the remote system to connect back to (default: same AES key to use for Kerberos Authentication (128 or 256
as server-host) bits) issues the specified WMI query enumerate active sessions
--server-port PORT --kdcHost KDCHOST --rid-brute [MAX_RID] --disks
start the server on the specified port FQDN of the domain controller. If omitted it will use the enumerate users by bruteforcing RID's (default: 4000) enumerate disks
domain part (FQDN) specified in the target parameter
--server-host HOST --loggedon-users-filter LOGGEDON_USERS_FILTER
--gfail-limit LIMIT
IP to bind the server to (default: 0.0.0.0) --pass-pol only search for specific user, works with regex
max number of global failed login attempts
--server {http,https} dump password policy --loggedon-users
--ufail-limit LIMIT
use the selected server (default: https) --local-groups [GROUP] enumerate logged on users
max number of failed login attempts per username
--options enumerate local groups, if a group is specified then its --users [USER]
--fail-limit LIMIT members are enumerated
display module options enumerate domain users, if a user is specified than only its
max number of failed login attempts per host --computers [COMPUTER] information is queried.
-L, --list-modules
-M MODULE, --module MODULE enumerate computer users --groups [GROUP]
list available modules
module to use enumerate domain groups, if a group is specified than its
members are enumerated
-o MODULE_OPTION [MODULE_OPTION ...]
Command Execution module to use max number of failed login attempts per host
-X PS_COMMAND --force-ps32
execute the specified PowerShell command force the PowerShell command to run in a 32-bit process rdp
-x COMMAND --no-output Screenshot
options
execute the specified command do not retrieve command output --screenshot
--local-auth -h, --help
Screenshot RDP if connection success
authenticate locally to each target show this help message and exit
ftp --screentime SCREENTIME
-d DOMAIN -id CRED_ID [CRED_ID ...]
Time to wait for desktop image
options domain to authenticate to database credential ID(s) to use for authentication
--res RES
--nla-screenshot -u USERNAME [USERNAME ...]
-continue-on-success -h, --help
Resolution in "WIDTHxHEIGHT" format. Default: "1024x768"
Screenshot RDP login prompt if NLA is disabled username(s) or file(s) containing usernames
continues authentication attempts even after successes show this help message and exit
--rdp-timeout RDP_TIMEOUT -p PASSWORD [PASSWORD ...]
--port PORT -id CRED_ID [CRED_ID ...]
RDP timeout on socket connection password(s) or file(s) containing passwords
FTP port (default: 21) database credential ID(s) to use for authentication
--port PORT -k, --kerberos
--no-bruteforce -u USERNAME [USERNAME ...]
Custom RDP port Use Kerberos authentication
No spray when using file for username and password username(s) or file(s) containing usernames
(user1 => password1, user2 => password2 --continue-on-success --use-kcache
-p PASSWORD [PASSWORD ...] @hackinarticles
--connectback-host CHOST continues authentication attempts even after successes Use Kerberos authentication from ccache file
password(s) or file(s) containing passwords
(KRB5CCNAME)
IP for the remote system to connect back to (default: same --no-bruteforce
as server-host) -k, --kerberos https://github.com/Ignitetechnologies
--export EXPORT [EXPORT ...]
No spray when using file for username and password
--server-port PORT Use Kerberos authentication
(user1 => password1, user2 => password2 Export result into a file, probably buggy
start the server on the specified port --use-kcache https://in.linkedin.com/company/hackingarticles -H HASH [HASH ...], --hash HASH [HASH ...] --aesKey AESKEY [AESKEY ...]
--server-host HOST Use Kerberos authentication from ccache file (
NTLM hash(es) or file(s) containing NTLM hashes AES key to use for Kerberos Authentication (128 or 256
bits)
IP to bind the server to (default: 0.0.0.0) KRB5CCNAME) --connectback-host CHOST
--kdcHost KDCHOST
--server {https,http} --export EXPORT [EXPORT ...] IP for the remote system to connect back to (default: same
as server-host) FQDN of the domain controller. If omitted it will use the
use the selected server (default: https) Export result into a file, probably buggy
domain part (FQDN) specified in the target parameter
--server-port PORT
--options --aesKey AESKEY [AESKEY ...]
--gfail-limit LIMIT
start the server on the specified port
display module options AES key to use for Kerberos Authentication (128 or 256
max number of global failed login attempts
bits) --server-host HOST
-L, --list-modules
--ufail-limit LIMIT
--kdcHost KDCHOST IP to bind the server to (default: 0.0.0.0)
list available modules
max number of failed login attempts per username
FQDN of the domain controller. If omitted it will use the --server {http,https}
-o MODULE_OPTION [MODULE_OPTION ...] domain part (FQDN) specified in the target parameter --fail-limit LIMIT
use the selected server (default: https)
module options --gfail-limit LIMIT max number of failed login attempts per host
--options
-M MODULE, --module MODULE max number of global failed login attempts -M MODULE, --module MODULE
display module options
module to use --ufail-limit LIMIT module to use
-L, --list-modules
max number of failed login attempts per username -o MODULE_OPTION [MODULE_OPTION ...]
list available modules
--fail-limit LIMIT module options
max number of failed login attempts per host