CrackMapExec(简称CME)是一种用于自动化评估大型Active Directory网络安全性的后渗透工具。CME以隐身为目标,遵循“靠山吃山”(Living off the Land)的概念:利用内置的Active Directory特性/协议来实现其功能,并允许它逃避大多数终端保护/IDS/IPS解决方案。
CME在使用网络协议和执行各种后渗透技术方面广泛使用Impacket库(由@asolino开发)。
尽管主要用于攻击性目的(如红队、内部渗透),但蓝队也可以使用CME评估帐户权限、查找可能的配置错误并模拟攻击场景。
依赖:
python3
python3-aardwolf
python3-aioconsole
python3-bs4
python3-dsinternals
python3-impacket
python3-lsassy
python3-masky
python3-msgpack
python3-neo4j
python3-paramiko
python3-pylnk3
python3-pypsrp
python3-pywerview
python3-requests
python3-termcolor
python3-terminaltables
python3-unicrypto
python3-xmltodict
安装或者使用
kali最新版本自带 - 没有自行安装
sudo apt install crackmapexec
[email protected]:~# crackmapexec -h
usage: crackmapexec [-h] [-t THREADS] [--timeout TIMEOUT] [--jitter INTERVAL]
[--darrell] [--verbose]
{mssql,winrm,ldap,ssh,smb,rdp,ftp} ...
______ .______ ___ ______ __ ___ .___ ___. ___ .______ _______ ___ ___ _______ ______
/ || _ \ / \ / || |/ / | \/ | / \ | _ \ | ____|\ \ / / | ____| / |
| ,----'| |_) | / ^ \ | ,----'| ' / | \ / | / ^ \ | |_) | | |__ \ V / | |__ | ,----'
| | | / / /_\ \ | | | < | |\/| | / /_\ \ | ___/ | __| > < | __| | |
| `----.| |\ \----. / _____ \ | `----.| . \ | | | | / _____ \ | | | |____ / . \ | |____ | `----.
\______|| _| `._____|/__/ \__\ \______||__|\__\ |__| |__| /__/ \__\ | _| |_______|/__/ \__\ |_______| \______|
A swiss army knife for pentesting networks
Forged by @byt3bl33d3r and @mpgn_x64 using the powah of dank memes
Exclusive release for Porchetta Industries users
https://porchetta.industries/
Version : 5.4.0
Codename: Indestructible G0thm0g
options:
-h, --help show this help message and exit
-t THREADS set how many concurrent threads to use (default: 100)
--timeout TIMEOUT max timeout in seconds of each thread (default: None)
--jitter INTERVAL sets a random delay between each connection (default: None)
--darrell give Darrell a hand
--verbose enable verbose output
protocols:
available protocols
{mssql,winrm,ldap,ssh,smb,rdp,ftp}
mssql own stuff using MSSQL
winrm own stuff using WINRM
ldap own stuff using LDAP
ssh own stuff using SSH
smb own stuff using SMB
rdp own stuff using RDP
ftp own stuff using FTP
项目地址:
https://github.com/Porchetta-Industries/CrackMapExec
食用文档:
https://wiki.porchetta.industries/
感谢您抽出
.
.
来阅读本文
点它,分享点赞在看都在这里