CrackMapExec Basics

Figure 1: Executed Virtual Environment
Figure 2: Executed CME
Figure 3: OS Enumeration
Figure 4: WinRM Enumeration
Figure 5: Password Policy (No Access)
Figure 6: Password Policy (Credentialed)
Figure 7: Brute Forcing (w/Lists)
Figure 8: No Brute Forcing (Single List)
Figure 9: Local Credential Spraying
Figure 10: Domain Credential Spraying
Figure 11: Domain Hash Spraying
Figure 12: WinRM Administrator Access (pwn3d)
Figure 13: Enumerating Shares
Figure 14: Dumping SAM Database
Figure 15: Dumping LSA Secrets

References:

Disclaimer:

--

--

--

Cyber Security Enthusiast

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Two Lies, One Truth Giveaway Game

Video-Conferencing Wars

Part 1 — Defensive Application Security in a Modern Organisation

Secure Digest Functions

How to: Proof of HUMANity

Mailchimp fraudulently charged my credit card for spambot activity… Really!

Behind the Scenes of MU5735!

How Many Accounts do You Have?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Mike Bond

Mike Bond

Cyber Security Enthusiast

More from Medium

HTB Write-up Sunday Port 79 (finger) Enum, SSH pass cracking with panator

Taking Good Notes

Securing Lichess one move at a time

Windows Fundamentals 1 — TryHackMe