CrackMapExec Runasppl (smb)


This page contains detailed information about how to use the runasppl CME module while using the smb protocol. For list of all CrackMapExec modules, visit the CrackMapExec Module Library.

Description


This module checks if the registry value RunAsPPL under HKLM\SYSTEM\CurrentControlSet\Control\Lsa is set or not. If set to 1, it protects against pass-the-hash or Mimikatz style attacks.

The runasppl module is OPSEC safe. This means that it doesn't touch the disk and therefore shouldn't trigger any alarms.

Supported Protocols


  • smb

Module Source Code


Authors


Module Usage


This is how to use the runasppl module while using the smb protocol:

Syntax:
# cme smb <TARGET[s]> -u <USERNAME> -p <PASSWORD> -d <DOMAIN> -M runasppl

Local admin:
# cme smb 10.0.5.1 -u Administrator -p P@ss123 -d . -M runasppl
# cme smb 10.0.5.1 -u Administrator -p P@ss123 --local-auth -M runasppl

Domain user:
# cme smb 10.0.5.1 -u bkpadmin -p P@ss123 -d target.corp -M runasppl

CrackMapExec also supports passing the hash, so you can specify NTLM hash instead of a password:

# cme smb 10.0.5.1 -u Administrator -H 432b022dc22aa5afe884e986b8383ff2 -d . -M runasppl
# cme smb 10.0.5.1 -u bkpadmin -H 432b022dc22aa5afe884e986b8383ff2 -d target.corp -M runasppl
The runasppl module can be also used against multiple hosts. Here's how to run it against multiple hosts:

# cme smb target_list.txt -u Administrator -p P@ss123 -d . -M runasppl
# cme smb 10.0.5.0/24 -u Administrator -p P@ss123 -d . -M runasppl
# cme smb 10.0.5.1-100 -u Administrator -p P@ss123 -d . -M runasppl

Module Options


As you can see below, the runasppl module doesn't have any additional options:

# cme smb -M runasppl --options
[*] runasppl module options:

References


Version


This page has been created based on CrackMapExec version 5.1.7dev.
Visit CrackMapExec Module Library for more modules.