
CrackMapExec
#Security Testing#Offensive Security
A list of useful payloads and bypasses for Web Application Security.
Post-Exploitation Tool Overview
This tool (e.g., Veil-Pillage, smbexec) serves as the 'glue' connecting various exploitation frameworks during penetration testing of Active Directory. It supports full concurrency, allowing you to connect and authenticate to multiple hosts simultaneously. The tool includes an internal database to store credentials and track users with administrative privileges. Its functionality relies on several other tools and libraries, which are listed in the README of the GitHub repository. Additionally, it is operational security (opsec) safe: all actions are either performed in memory, enumerated over the network using WinAPI calls, or executed through built-in Windows tools and features.
Part 1 will cover the basics, including how to use credentials, dump credentials, execute commands, and utilize the tool effectively.