Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. CrackMapExec

CrackMapExec

CrackMapExec, or CME, is a post-exploitation tool developed in Python and designed for penetration testing against networks.CrackMapExec collects Active Directory information to conduct lateral movement through targeted networks.[1]

ID: S0488
Type: TOOL
Platforms: Windows
Version: 1.1
Created: 17 July 2020
Last Modified: 14 March 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1087.002Account Discovery:Domain Account

CrackMapExec can enumerate the domain user accounts on a targeted system.[1]

EnterpriseT1110Brute Force

CrackMapExec can brute force supplied user credentials across a network range.[1]

.001Password Guessing

CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network.[1]

.003Password Spraying

CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password.[1]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

CrackMapExec can execute PowerShell commands via WMI.[1]

EnterpriseT1083File and Directory Discovery

CrackMapExec can discover specified filetypes and log files on a targeted system.[1]

EnterpriseT1680Local Storage Discovery

CrackMapExec can enumerate the system drives and associated system name.[1]

EnterpriseT1112Modify Registry

CrackMapExec can create a registry key using wdigest.[1]

EnterpriseT1135Network Share Discovery

CrackMapExec can enumerate the shared folders and associated permissions for a targeted network.[1]

EnterpriseT1003.002OS Credential Dumping:Security Account Manager

CrackMapExec can dump usernames and hashed passwords from the SAM.[1]

.003OS Credential Dumping:NTDS

CrackMapExec can dump hashed passwords associated with Active Directory using Windows' Directory Replication Services API (DRSUAPI), or Volume Shadow Copy.[1]

.004OS Credential Dumping:LSA Secrets

CrackMapExec can dump hashed passwords from LSA secrets for the targeted system.[1]

EnterpriseT1201Password Policy Discovery

CrackMapExec can discover the password policies applied to the target system.[1]

EnterpriseT1069.002Permission Groups Discovery:Domain Groups

CrackMapExec can gather the user accounts within domain groups.[1]

EnterpriseT1018Remote System Discovery

CrackMapExec can discover active IP addresses, along with the machine name, within a targeted network.[1]

EnterpriseT1053.002Scheduled Task/Job:At

CrackMapExec can set a scheduled task on the target system to execute commands remotely usingat.[1]

EnterpriseT1016System Network Configuration Discovery

CrackMapExec can collect DNS information from the targeted system.[1]

EnterpriseT1049System Network Connections Discovery

CrackMapExec can discover active sessions for a targeted system.[1]

EnterpriseT1550.002Use Alternate Authentication Material:Pass the Hash

CrackMapExec can pass the hash to authenticate via SMB.[1]

EnterpriseT1047Windows Management Instrumentation

CrackMapExec can execute remote commands using Windows Management Instrumentation.[1]

Groups That Use This Software

Campaigns

IDNameDescription
C0029Cutting Edge

[10]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp