root
12443285e9
Fix SMB encode
2019-07-13 17:52:00 +02:00
root
e435a4f87b
Fix SMB encode
2019-07-13 17:50:24 +02:00
Augustin Laville
fdb41c0125
Fix encoding in smb --sam
2019-04-12 13:32:38 +02:00
Harrison Neal
85e4de988b
Fix false positive signing disabled with SMB2/3
...
Currently, the SMBConnection.isSigningRequired and SMB3.is_signing_required methods in Impacket reflect the state of the session as opposed to the state of the connection. When using CME with the --gen-relay-list option, the login method would encounter an exception near the end, and would reset the session state. Afterwards, the connection state correctly showed that signing was required, but the session state claimed the opposite. The latter contributed to many false positives in the --gen-relay-list output file. This is a hackish change that addressed the issue for me.
2019-03-26 15:45:02 -04:00
Sebastián Castro
49a002fcd4
Merge branch 'master' into rid_hijacking
2019-03-23 16:10:44 -05:00
byt3bl33d3r
333f1c4e06
Updated all submodules, replace pycrypto with pycryptodomex
2019-03-13 21:51:25 -06:00
byt3bl33d3r
a258bcf409
Merge pull request #296 from awsmhacks/patch-1
...
Update for requirements.txt
2019-03-09 08:38:40 -07:00
Ryan
e6cd58e9bb
Update requirements.txt
...
Adding pycryptodomex to resolve "ImportError: No module named Cryptodome.Hash" after install
2019-03-07 14:31:09 -06:00
r4wd3r
ab1e75da0e
Modify MANIFEST for RID-Hijacking
2019-02-24 20:54:14 -05:00
r4wd3r
144206cf34
Add rid_hijack documentation to README
2019-02-24 20:52:44 -05:00
r4wd3r
56ed25b621
Add rid_hijack.py module
2019-02-24 20:51:16 -05:00
r4wd3r
d472bdb004
Add RID-Hijacking submodule
2019-02-24 20:50:03 -05:00
byt3bl33d3r
4c637a5c1d
Merge pull request #291 from caesarcipher-r7/patch-1
...
adding shabang
2019-02-20 16:52:16 -07:00
Gabriel
2276c06755
adding shabang
...
shabang declaration allows simpler ./setup.py execution on command line which matches existing executable permissions on setup file, rather than requiring 'python setup.py' execution
2019-02-05 13:31:02 -06:00
byt3bl33d3r
dbe142c1ae
Merge pull request #280 from awsmhacks/master
...
update to powershell.py
2018-12-10 16:03:12 -07:00
Ryan
304836d702
update powershell.py
...
Adding [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]'Ssl3,Tls,Tls11,Tls12' to fix a SSL/TLS error
2018-12-06 14:07:40 -06:00
byt3bl33d3r
75449f62bc
Merge pull request #274 from RootUp/patch-1
...
Add Get-ComputerDetails
2018-11-18 13:37:06 -05:00
Dhiraj Mishra
b4fb22f6fe
Get-ComputerDetails.py
2018-11-04 14:22:17 +05:30
byt3bl33d3r
ea3402dd0e
Updated requirements.txt
2018-08-29 15:35:03 +08:00
byt3bl33d3r
224c24a0a4
Updated all submodules and packages
2018-08-29 15:33:02 +08:00
byt3bl33d3r
9215b77900
Update README.md
2018-08-29 12:13:18 +08:00
byt3bl33d3r
f61cb7e3f0
Merge pull request #256 from FrankSpierings/patch-2
...
Modified logging in spider.py
2018-08-28 19:57:55 +08:00
byt3bl33d3r
50a379dad4
Merge pull request #255 from FrankSpierings/patch-1
...
Update smbspider.py - Feature to use `--spider '*'` to spider all rea…
2018-08-28 19:55:54 +08:00
byt3bl33d3r
0128b589dc
Merge pull request #248 from kmackinley/kmackinley-cme-dev1
...
Flag to allow continuation while password spraying
2018-08-28 19:40:14 +08:00
root
1a7174137c
Added remotehost in the spidering output. It is now //<remotehost>/<share>/<folder *>/<file>
2018-07-07 14:33:14 +00:00
Frank Spierings
2823452053
Update smbspider.py - Feature to use `--spider '*'` to spider all readable shares
...
I've added the option to allow spidering over all readable shares.
2018-07-07 16:00:59 +02:00
byt3bl33d3r
3984364cfb
Merge pull request #250 from DanMcInerney/master
...
updated amsi bypass
2018-05-30 10:54:11 -06:00
Dan McInerney
dabdcf49ca
updated amsi bypass
2018-05-29 17:47:54 -06:00
Korey McKinley
7034ab66d0
Flag to allow continuation while password spraying
...
Adds --continue-on-success flag when spraying passwords using smb. Allows for continuing of password spraying even after valid password is found. (Useful when password spraying with userlist.)
Usage example:
cme smb ipaddress -u users.txt -p password --continue-on-success
In response to:
https://github.com/byt3bl33d3r/CrackMapExec/issues/245
https://github.com/byt3bl33d3r/CrackMapExec/issues/247
2018-05-26 19:44:24 -06:00
byt3bl33d3r
f3465ef008
Fixed up @aj-cgtech changes
2018-03-01 12:36:17 -07:00
byt3bl33d3r
5fd4aa716c
Merge branch 'usersfix' of https://github.com/aj-cgtech/CrackMapExec into aj-cgtech-usersfix
2018-03-01 11:57:33 -07:00
byt3bl33d3r
12846a7e9e
Merge pull request #237 from friendlyintruder/master
...
fixes debug output error if exec method fails
2018-03-01 11:51:57 -07:00
byt3bl33d3r
d0913ee88c
Merge pull request #234 from aj-cgtech/dbexportfeatures
...
Added extra export options and command line feedback.
2018-03-01 11:46:24 -07:00
Markus Krell
8dd4e95fe7
fixes debug output error if exec method fails
2018-02-23 14:55:05 +01:00
aj-cgtech
fffc24ae46
Having worked out how the protocol object is created. Created config
...
object once, and set as an attr on each protocol.
More elegant, and allows for further config options in the future.
2018-02-23 10:13:46 +00:00
aj-cgtech
b6a7028999
Typo, not l33t.
2018-02-22 21:18:31 +00:00
aj-cgtech
7e2a267328
Merging "Pwn3d!" label changes.
...
Fixes issue #236
Adds the ability to change the (Pwned!) label on CME output.
By default, nothing changes, but if required, to keep suits happy, you
can change the output of CME by adding a property to ~/.cme/cme.conf, in
the [CME] section, property "pwn3d_label".
eg:
[CME]
workspace = default
last_used_db = smb
pwn3d_label = Woot!
2018-02-22 20:24:03 +00:00
aj-cgtech
6ee852387c
Pwn3d label parameterised in config file.
2018-02-22 13:03:07 +00:00
aj-cgtech
8bba4b46f6
Changes to users() and groups()
...
users() was failing on a bad attribute, changed code to use getattr
instead. If attribute is missing, it no longer throws exception.
extraction of domain from distinguished name was not working in all
circumstances. FOO.COM would work, but FOO.CO.UK or even FOO.BAR.CO.UK
would extract CO incorrectly. function now extracts fully qualified
domain, which then gets shortened by db_add_user() function.
2018-02-20 12:57:23 +00:00
aj-cgtech
e1e68abe9a
Added extra export options and command line feedback.
2018-02-19 14:47:12 +00:00
byt3bl33d3r
22a519ed7c
Merge pull request #231 from fang0654/master
...
Added module for enumerating AD DNS via WMI.
2018-01-22 20:13:04 -07:00
Daniel Lawson
a908d64fc1
Added module for enumerating AD DNS via WMI.
2018-01-22 18:45:56 -06:00
byt3bl33d3r
f4f9ec52c2
Updated README
2017-12-20 17:43:54 -07:00
byt3bl33d3r
4b35455997
Refactored Database Menu code
...
- Fixed some MSSQL DB interaction bugs
- Made MSSQL DB schema more consistent
- cmedb output now gets formatted using terminaltables (so perty)
- Made everything a bit more PEP8 compliant
2017-11-02 17:43:08 +08:00
byt3bl33d3r
c1b1722bfe
Merge pull request #214 from Ganapati/master
...
Fix errors handling from empire
2017-10-25 03:44:29 -06:00
ganapati
6b6a1b4de5
Fix errors from empire
2017-10-25 10:28:55 +02:00
byt3bl33d3r
ee9b6f53d3
Updated README.md
2017-10-25 01:02:55 -06:00
byt3bl33d3r
2b00a795da
Fixed Powershell execution using MSSQL
2017-10-25 00:45:58 -06:00
byt3bl33d3r
f1c6858e55
Fixed bug where creds dumped via mimikatz wouldn't be added to the database
2017-10-24 22:56:34 -06:00
byt3bl33d3r
03f8fc6503
Fixes #187
2017-10-24 21:52:41 -06:00