dEEpEst
☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
- Joined
- Mar 29, 2018
- Messages
- 13,861
- Solutions
- 4
- Reputation
- 27
- Reaction score
- 45,546
- Points
- 1,813
- Credits
- 55,350
7 Years of Service
56%



CrackMapExec (CME) is a powerful open-source post-exploitation and Active Directory auditing tool written in Python. Originally built for Red Teamers and pentesters, it allows lateral movement, credentials dumping, privilege checks, and network enumeration across Windows domains — all through a single unified interface. Its versatility and efficiency make it a must-have tool when conducting internal network assessments.

- Comprehensive Network Enumeration: Gather detailed data about users, hosts, groups, sessions, shares, domain policies, and more — all from within the AD environment.
- Post-Exploitation Capabilities: CME can dump NTLM/Kerberos hashes, run remote commands, and facilitate lateral movement through the network.
- Privilege Escalation & Testing: Easily verify if a user has Local Admin, Domain Admin, or other elevated rights. Detect common misconfigurations like
Unconstrained Delegation
. - Multi-Protocol Support: CME supports a variety of Windows protocols for maximum coverage:
- 445/TCP SMB – File/Printer share access.
- 5985/5986 WinRM – Remote PowerShell execution.
- 1433 MSSQL – SQL query execution and injection.
- 389 LDAP – Advanced Active Directory queries.
- 445/TCP SMB – File/Printer share access.

Let’s say you have credentials (or weak default ones) and want to identify local admin accounts across an internal subnet (192.168.1.0/24). You could try extracting password hashes from the SAM database like this:
Bash:
crackmapexec smb 192.168.1.0/24 -u 'Administrator' -p 'Password123!' --sam
Explanation:
- Scans the /24 subnet for reachable SMB shares.
- Authenticates with
Administrator:Password123!
on each machine. - If successful, dumps local SAM password hashes.
- These hashes can be cracked offline or reused in Pass-the-Hash attacks.

This content is intended for educational and ethical research purposes only. Do not use CME or any offensive security tool on networks you do not own or have explicit permission to test.

CrackMapExec remains one of the most robust post-exploitation tools for assessing Windows domain environments. Its support for critical protocols (SMB, WinRM, MSSQL, LDAP), seamless enumeration, and post-ex capabilities make it a key asset in the Red Team arsenal. When used responsibly, it uncovers dangerous misconfigs and weak credentials before adversaries do.
