Windows/Active 目录横向移动工具包
2023-6-16 13:2:11 Author: Ots安全(查看原文) 阅读量:15 收藏

CrackMapExec(简称CME)是一种用于自动化评估大型Active Directory网络安全性的后渗透工具。CME以隐身为目标,遵循“靠山吃山”(Living off the Land)的概念:利用内置的Active Directory特性/协议来实现其功能,并允许它逃避大多数终端保护/IDS/IPS解决方案。

CME在使用网络协议和执行各种后渗透技术方面广泛使用Impacket库(由@asolino开发)。

尽管主要用于攻击性目的(如红队、内部渗透),但蓝队也可以使用CME评估帐户权限、查找可能的配置错误并模拟攻击场景。


依赖:

python3python3-aardwolfpython3-aioconsolepython3-bs4python3-dsinternalspython3-impacketpython3-lsassypython3-maskypython3-msgpackpython3-neo4jpython3-paramikopython3-pylnk3python3-pypsrppython3-pywerviewpython3-requestspython3-termcolorpython3-terminaltablespython3-unicryptopython3-xmltodict

安装或者使用

kali最新版本自带 - 没有自行安装sudo apt install crackmapexec
[email protected]:~# crackmapexec -husage: crackmapexec [-h] [-t THREADS] [--timeout TIMEOUT] [--jitter INTERVAL]                    [--darrell] [--verbose]                    {mssql,winrm,ldap,ssh,smb,rdp,ftp} ...
______ .______ ___ ______ __ ___ .___ ___. ___ .______ _______ ___ ___ _______ ______ / || _ \ / \ / || |/ / | \/ | / \ | _ \ | ____|\ \ / / | ____| / | | ,----'| |_) | / ^ \ | ,----'| ' / | \ / | / ^ \ | |_) | | |__ \ V / | |__ | ,----' | | | / / /_\ \ | | | < | |\/| | / /_\ \ | ___/ | __| > < | __| | | | `----.| |\ \----. / _____ \ | `----.| . \ | | | | / _____ \ | | | |____ / . \ | |____ | `----. \______|| _| `._____|/__/ \__\ \______||__|\__\ |__| |__| /__/ \__\ | _| |_______|/__/ \__\ |_______| \______|
A swiss army knife for pentesting networks Forged by @byt3bl33d3r and @mpgn_x64 using the powah of dank memes
Exclusive release for Porchetta Industries users https://porchetta.industries/
Version : 5.4.0 Codename: Indestructible G0thm0g
options: -h, --help show this help message and exit -t THREADS set how many concurrent threads to use (default: 100) --timeout TIMEOUT max timeout in seconds of each thread (default: None) --jitter INTERVAL sets a random delay between each connection (default: None) --darrell give Darrell a hand --verbose enable verbose output
protocols: available protocols
{mssql,winrm,ldap,ssh,smb,rdp,ftp} mssql own stuff using MSSQL winrm own stuff using WINRM ldap own stuff using LDAP ssh own stuff using SSH smb own stuff using SMB rdp own stuff using RDP    ftp                 own stuff using FTP

项目地址:

https://github.com/Porchetta-Industries/CrackMapExec

食用文档:

https://wiki.porchetta.industries/

感谢您抽出

.

.

来阅读本文

点它,分享点赞在看都在这里


文章来源: http://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247498840&idx=1&sn=adf2528e52ff3a725e86360a58a89700&chksm=9badb513acda3c05c7b3bdc5e4983f25d4125ff8052f28c12dd8c4eff23fb7993af84f411771#rd
如有侵权请联系:admin#unsafe.sh