🔱
🔱
🔱
🔱
CrackMapExec ~ CME WIKI
@mpgn_x64
Search
⌃
K
Links
Introduction
🔥
News
Changelog
Other Gitbook
Getting Started
Installation
Selecting & Using a Protocol
Target Formats
Using Credentials
Using Kerberos
Using Modules
Database General Usage
BloodHound integration
Audit Mode
Log your results
SMB protocol
Scan for vulnerabilities
Enumeration
Password spraying
Authentication
Command execution
Spidering Shares
Get and Put files
Obtaining Credentials
Defeating LAPS
Spooler, WebDav running ?
Steal Microsoft Teams cookies
LDAP protocol
Authentication
ASREPRoast
Find domain SID
Kerberoasting
Unconstrained delegation
Admin Count
Machine Account Quota
Get user descriptions
Dump gMSA
Exploit ESC8 (adcs)
Extract subnet
Check LDAP signing
Read DACL right
Extract gMSA secrets
Bloodhound Ingestor
List DC IP
Enumerate trusts
WINRM protocol
Password spraying
Authentication
Command execution
Defeating LAPS
MSSQL protocol
Password spraying
Authentication
MSSQL Privesc
MSSQL command
MSSQL upload/download
Windows command
SSH protocol
Password spraying
Authentication
Command execution
FTP protocol
Password spraying
RDP Protocol
Password spraying
Screenshot (connected)
Screenshot without NLA (not connected)
WMI Protocol
Password spraying
Authentication
Command execution
Powered By
GitBook
MSSQL Privesc
Module to privesc from standard user to DBA
cme mssql <ip> -u user -p password -M mssql_priv
MSSQL protocol - Previous
Authentication
Next - MSSQL protocol
MSSQL command
Last modified
2yr ago