CrackMapExec Enum_avproducts (smb)
This page contains detailed information about how to use the enum_avproducts CME module while using the smb protocol. For list of all CrackMapExec modules, visit the CrackMapExec Module Library.
Description
This module uses WMI to gather information on all endpoint protection solutions installed on the the remote host(s). It checks the AntiSpywareProduct and AntiVirusProduct classes in the Security Center.
The enum_avproducts module is OPSEC safe. This means that it doesn't touch the disk and therefore shouldn't trigger any alarms.
Supported Protocols
- smb
Module Source Code
Authors
Module Usage
This is how to use the enum_avproducts module while using the smb protocol:
Syntax:
# cme smb <TARGET[s]> -u <USERNAME> -p <PASSWORD> -d <DOMAIN> -M enum_avproducts
Local admin:
# cme smb 10.0.5.1 -u Administrator -p P@ss123 -d . -M enum_avproducts
# cme smb 10.0.5.1 -u Administrator -p P@ss123 --local-auth -M enum_avproducts
Domain user:
# cme smb 10.0.5.1 -u bkpadmin -p P@ss123 -d target.corp -M enum_avproducts
CrackMapExec also supports passing the hash, so you can specify NTLM hash instead of a password:
# cme smb 10.0.5.1 -u Administrator -H 432b022dc22aa5afe884e986b8383ff2 -d . -M enum_avproducts
# cme smb 10.0.5.1 -u bkpadmin -H 432b022dc22aa5afe884e986b8383ff2 -d target.corp -M enum_avproducts
# cme smb target_list.txt -u Administrator -p P@ss123 -d . -M enum_avproducts
# cme smb 10.0.5.0/24 -u Administrator -p P@ss123 -d . -M enum_avproducts
# cme smb 10.0.5.1-100 -u Administrator -p P@ss123 -d . -M enum_avproducts
Module Options
As you can see below, the enum_avproducts module doesn't have any additional options:
# cme smb -M enum_avproducts --options
[*] enum_avproducts module options:
None
References
- https://www.netspi.com/blog/technical/adversary-simulation/getting-started-wmi-weaponization-part-2/
Version
This page has been created based on CrackMapExec version 5.1.7dev.
Visit CrackMapExec Module Library for more modules.