CME makes heavy use of the Impacket library (developed by @asolino) and the PowerSploit Toolkit (developed by @mattifestation) for working with network protocols and performing a variety of post-exploitation techniques.
Although meant to be used primarily for offensive purposes (e.g. red teams), CME can be used by blue teams as well to assess account privileges, find possible misconfigurations and simulate attack scenarios.
CrackMapExec is developed by @byt3bl33d3r
#~ apt-get install -y libssl-dev libffi-dev python-dev build-essential
#~ git clone http://ift.tt/1TTPVDg
#- cd CrackMapExec && git submodule init && git submodule update –recursive
#~ python setup.py install
git pull origin master
git submodule init && git submodule update –recursive
Upgrade using pip
pip2 install crackmapexec –upgrade
The post CRACKMAPEXEC V4.0 – A swiss army knife for pentesting networks appeared first on Penetration Testing.