Skip to content
This repository was archived by the owner on Dec 6, 2023. It is now read-only.

Commit 698f147

Browse files
author
byt3bl33d3r
committed
Updated README.md
1 parent 022671d commit 698f147

File tree

1 file changed

+25
-23
lines changed

1 file changed

+25
-23
lines changed

README.md

Lines changed: 25 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -63,34 +63,35 @@ See the project's [wiki](https://github.com/byt3bl33d3r/CrackMapExec/wiki) for d
6363
#Usage
6464

6565
```
66-
______ .______ ___ ______ __ ___ .___ ___. ___ .______ _______ ___ ___ _______ ______
67-
/ || _ \ / \ / || |/ / | \/ | / \ | _ \ | ____|\ \ / / | ____| / |
68-
| ,----'| |_) | / ^ \ | ,----'| ' / | \ / | / ^ \ | |_) | | |__ \ V / | |__ | ,----'
69-
| | | / / /_\ \ | | | < | |\/| | / /_\ \ | ___/ | __| > < | __| | |
70-
| `----.| |\ \----. / _____ \ | `----.| . \ | | | | / _____ \ | | | |____ / . \ | |____ | `----.
71-
\______|| _| `._____|/__/ \__\ \______||__|\__\ |__| |__| /__/ \__\ | _| |_______|/__/ \__\ |_______| \______|
72-
73-
Swiss army knife for pentesting Windows/Active Directory environments | @byt3bl33d3r
74-
75-
Powered by Impacket https://github.com/CoreSecurity/impacket (@agsolino)
76-
77-
Inspired by:
78-
@ShawnDEvans's smbmap https://github.com/ShawnDEvans/smbmap
79-
@gojhonny's CredCrack https://github.com/gojhonny/CredCrack
80-
@pentestgeek's smbexec https://github.com/pentestgeek/smbexec
81-
82-
Version: 3.1
83-
Codename: 'Duchess'
84-
66+
______ .______ ___ ______ __ ___ .___ ___. ___ .______ _______ ___ ___ _______ ______
67+
/ || _ \ / \ / || |/ / | \/ | / \ | _ \ | ____|\ \ / / | ____| / |
68+
| ,----'| |_) | / ^ \ | ,----'| ' / | \ / | / ^ \ | |_) | | |__ \ V / | |__ | ,----'
69+
| | | / / /_\ \ | | | < | |\/| | / /_\ \ | ___/ | __| > < | __| | |
70+
| `----.| |\ \----. / _____ \ | `----.| . \ | | | | / _____ \ | | | |____ / . \ | |____ | `----.
71+
\______|| _| `._____|/__/ \__\ \______||__|\__\ |__| |__| /__/ \__\ | _| |_______|/__/ \__\ |_______| \______|
72+
73+
Swiss army knife for pentesting Windows/Active Directory environments | @byt3bl33d3r
74+
75+
Powered by Impacket https://github.com/CoreSecurity/impacket (@agsolino)
76+
77+
Inspired by:
78+
@ShawnDEvans's smbmap https://github.com/ShawnDEvans/smbmap
79+
@gojhonny's CredCrack https://github.com/gojhonny/CredCrack
80+
@pentestgeek's smbexec https://github.com/pentestgeek/smbexec
81+
82+
Version: 3.1.3
83+
Codename: 'Stoofvlees'
84+
8585
8686
positional arguments:
8787
target The target IP(s), range(s), CIDR(s), hostname(s), FQDN(s) or file(s) containg a list of targets
8888
8989
optional arguments:
9090
-h, --help show this help message and exit
9191
-v, --version show program's version number and exit
92-
-t THREADS Set how many concurrent threads to use (defaults to 100)
93-
-id CRED_ID Database credential ID to use for authentication
92+
-t THREADS Set how many concurrent threads to use (default: 100)
93+
-id [CRED_ID [CRED_ID ...]]
94+
Database credential ID(s) to use for authentication
9495
-u [USERNAME [USERNAME ...]]
9596
Username(s) or file(s) containing usernames
9697
-d DOMAIN Domain name
@@ -113,6 +114,8 @@ optional arguments:
113114
--local-auth Authenticate locally to each target
114115
--timeout TIMEOUT Max timeout in seconds of each thread (default: 20)
115116
--verbose Enable verbose output
117+
--gfail-limit LIMIT Max number of global failed login attemptes
118+
--fail-limit LIMIT Max number of failed login attemptes per host
116119
117120
Credential Gathering:
118121
Options for gathering credentials
@@ -171,8 +174,7 @@ MSSQL Interaction:
171174
--mssql Switches CME into MSSQL Mode. If credentials are provided will authenticate against all discovered MSSQL DBs
172175
--mssql-query QUERY Execute the specifed query against the MSSQL DB
173176
174-
I swear I had something for this...
175-
177+
What is it? It's a stew... But what is it? It's a stew...
176178
```
177179

178180
#To do

0 commit comments

Comments
 (0)