CrackMapExec(简称CME)是一种用于自动化评估大型Active Directory网络安全性的后渗透工具。CME以隐身为目标,遵循“靠山吃山”(Living off the Land)的概念:利用内置的Active Directory特性/协议来实现其功能,并允许它逃避大多数终端保护/IDS/IPS解决方案。
CME在使用网络协议和执行各种后渗透技术方面广泛使用Impacket库(由@asolino开发)。
尽管主要用于攻击性目的(如红队、内部渗透),但蓝队也可以使用CME评估帐户权限、查找可能的配置错误并模拟攻击场景。
依赖:
python3python3-aardwolfpython3-aioconsolepython3-bs4python3-dsinternalspython3-impacketpython3-lsassypython3-maskypython3-msgpackpython3-neo4jpython3-paramikopython3-pylnk3python3-pypsrppython3-pywerviewpython3-requestspython3-termcolorpython3-terminaltablespython3-unicryptopython3-xmltodict
安装或者使用
kali最新版本自带 - 没有自行安装sudo apt install crackmapexec
[email protected]:~# crackmapexec -husage: crackmapexec [-h] [-t THREADS] [--timeout TIMEOUT] [--jitter INTERVAL][--darrell] [--verbose]{mssql,winrm,ldap,ssh,smb,rdp,ftp} ...______ .______ ___ ______ __ ___ .___ ___. ___ .______ _______ ___ ___ _______ ______/ || _ \ / \ / || |/ / | \/ | / \ | _ \ | ____|\ \ / / | ____| / || ,----'| |_) | / ^ \ | ,----'| ' / | \ / | / ^ \ | |_) | | |__ \ V / | |__ | ,----'| | | / / /_\ \ | | | < | |\/| | / /_\ \ | ___/ | __| > < | __| | || `----.| |\ \----. / _____ \ | `----.| . \ | | | | / _____ \ | | | |____ / . \ | |____ | `----.\______|| _| `._____|/__/ \__\ \______||__|\__\ |__| |__| /__/ \__\ | _| |_______|/__/ \__\ |_______| \______|A swiss army knife for pentesting networksForged by @byt3bl33d3r and @mpgn_x64 using the powah of dank memesExclusive release for Porchetta Industries usershttps://porchetta.industries/Version : 5.4.0Codename: Indestructible G0thm0goptions:-h, --help show this help message and exit-t THREADS set how many concurrent threads to use (default: 100)--timeout TIMEOUT max timeout in seconds of each thread (default: None)--jitter INTERVAL sets a random delay between each connection (default: None)--darrell give Darrell a hand--verbose enable verbose outputprotocols:available protocols{mssql,winrm,ldap,ssh,smb,rdp,ftp}mssql own stuff using MSSQLwinrm own stuff using WINRMldap own stuff using LDAPssh own stuff using SSHsmb own stuff using SMBrdp own stuff using RDPftp own stuff using FTP
项目地址:
https://github.com/Porchetta-Industries/CrackMapExec
食用文档:
https://wiki.porchetta.industries/
感谢您抽出
.
.
来阅读本文
点它,分享点赞在看都在这里