CrackMapExec Basics

Figure 1: Executed Virtual Environment
Figure 2: Executed CME
Figure 3: OS Enumeration
Figure 4: WinRM Enumeration
Figure 5: Password Policy (No Access)
Figure 6: Password Policy (Credentialed)
Figure 7: Brute Forcing (w/Lists)
Figure 8: No Brute Forcing (Single List)
Figure 9: Local Credential Spraying
Figure 10: Domain Credential Spraying
Figure 11: Domain Hash Spraying
Figure 12: WinRM Administrator Access (pwn3d)
Figure 13: Enumerating Shares
Figure 14: Dumping SAM Database
Figure 15: Dumping LSA Secrets

References:

Disclaimer:

--

--

--

Cyber Security Enthusiast

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

TECHNICAL INSTRUCTIONS ON SENDING CURRENCIES ON S-WALLET

{UPDATE} Samorost 3 Hack Free Resources Generator

Investigating the security impact of Foreshadow/L1TF

Shocker — A HTB Walkthrough

Why Network Security is Vital for Protecting Small Business Data

The Basics of DRIP and How You Can Achieve a 3,678% APY

{UPDATE} ゲシュタルト崩壊 Hack Free Resources Generator

Linux Distros I find interesting for ethical hacking

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Mike Bond

Mike Bond

Cyber Security Enthusiast

More from Medium

How to protect from Spring4Shell

How I passed my C|EH Practical and how you can too ?

Journey of a Cyber Guardian : Reconnaissance

Black-box 3 — INE Penetration Testing Basics