Skip to content
This repository was archived by the owner on Dec 6, 2023. It is now read-only.

Commit 5285690

Browse files
author
byt3bl33d3r
committed
Updated usage in README
1 parent b0ce967 commit 5285690

File tree

2 files changed

+12
-15
lines changed

2 files changed

+12
-15
lines changed

README.md

Lines changed: 11 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -53,20 +53,23 @@ positional arguments:
5353
optional arguments:
5454
-h, --help show this help message and exit
5555
-t THREADS Set how many concurrent threads to use
56-
-u USERNAME Username, if omitted null session assumed
57-
-p PASSWORD Password
58-
-H HASH NTLM hash
59-
-n NAMESPACE Namespace name (default //./root/cimv2)
56+
-u USERNAME Username(s) or file containing usernames
57+
-p PASSWORD Password(s) or file containing passwords
58+
-H HASH NTLM hash(es) or file containing NTLM hashes
59+
-C COMBO_FILE Combo file containing a list of domain\username:password or username:password entries
6060
-d DOMAIN Domain name
61+
-n NAMESPACE WMI Namespace (default //./root/cimv2)
6162
-s SHARE Specify a share (default: C$)
62-
-P {139,445} SMB port (default: 445)
63+
--port {139,445} SMB port (default: 445)
6364
-v Enable verbose output
6465
6566
Credential Gathering:
6667
Options for gathering credentials
6768
6869
--sam Dump SAM hashes from target systems
69-
--mimikatz Run Invoke-Mimikatz on target systems
70+
--mimikatz Run Invoke-Mimikatz (sekurlsa::logonpasswords) on target systems
71+
--mimikatz-cmd MIMIKATZ_CMD
72+
Run Invoke-Mimikatz with the specified command
7073
--ntds {ninja,vss,drsuapi}
7174
Dump the NTDS.dit from target DCs using the specifed method
7275
(drsuapi is the fastest)
@@ -80,13 +83,6 @@ Mapping/Enumeration:
8083
--lusers Enumerate logged on users
8184
--wmi QUERY Issues the specified WMI query
8285
83-
Account Bruteforcing:
84-
Options for bruteforcing SMB accounts
85-
86-
--bruteforce USER_FILE PASS_FILE
87-
Your wordlists containing Usernames and Passwords
88-
--exhaust Don't stop on first valid account found
89-
9086
Spidering:
9187
Options for spidering shares
9288
@@ -105,7 +101,7 @@ Command Execution:
105101
-X PS_COMMAND Excute the specified powershell command
106102
107103
Shellcode/EXE/DLL injection:
108-
Options for injecting Shellcode/EXE/DLL's using PowerShell
104+
Options for injecting Shellcode/EXE/DLL's in memory using PowerShell
109105
110106
--inject {exe,shellcode,dll}
111107
Inject Shellcode, EXE or a DLL
@@ -122,6 +118,7 @@ Filesystem interaction:
122118
--delete PATH Delete a remote file
123119
124120
There's been an awakening... have you felt it?
121+
125122
```
126123

127124
#Examples

crackmapexec.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2756,7 +2756,7 @@ def concurrency(hosts):
27562756

27572757
rgroup = parser.add_argument_group("Credential Gathering", "Options for gathering credentials")
27582758
rgroup.add_argument("--sam", action='store_true', help='Dump SAM hashes from target systems')
2759-
rgroup.add_argument("--mimikatz", action='store_true', help='Run Invoke-Mimikatz on target systems')
2759+
rgroup.add_argument("--mimikatz", action='store_true', help='Run Invoke-Mimikatz (sekurlsa::logonpasswords) on target systems')
27602760
rgroup.add_argument("--mimikatz-cmd", metavar='MIMIKATZ_CMD', dest='mimi_cmd', help='Run Invoke-Mimikatz with the specified command')
27612761
rgroup.add_argument("--ntds", choices={'vss', 'drsuapi', 'ninja'}, help="Dump the NTDS.dit from target DCs using the specifed method\n(drsuapi is the fastest)")
27622762

0 commit comments

Comments
 (0)