CrackMapExec Spooler (smb)


This page contains detailed information about how to use the spooler CME module while using the smb protocol. For list of all CrackMapExec modules, visit the CrackMapExec Module Library.

Description


For printnightmare: detect if print spooler is enabled or not. Then use @cube0x0's project https://github.com/cube0x0/CVE-2021-1675 or Mimikatz from Benjamin Delpy.

The spooler module is OPSEC safe. This means that it doesn't touch the disk and therefore shouldn't trigger any alarms.

Supported Protocols


  • smb

Module Source Code


Authors


Module Options


As you can see below, the spooler module has one option:

# cme smb -M spooler --options
[*] spooler module options:

           PORT  Remote port (default: 135)

Note that this option is not required. If you want to change the default value, you can do so by appending -o PORT=VALUE parameter to the command line.

Module Usage


This is how to use the spooler module while using the smb protocol:

Syntax:
# cme smb <TARGET[s]> -u <USERNAME> -p <PASSWORD> -d <DOMAIN> -M spooler

Local admin
# cme smb 10.0.5.1 -u Administrator -p P@ss123 -d . -M spooler
# cme smb 10.0.5.1 -u Administrator -p P@ss123 --local-auth -M spooler

Domain user
# cme smb 10.0.5.1 -u bkpadmin -p P@ss123 -d target.corp -M spooler

CrackMapExec also supports passing the hash, so you can specify NTLM hash instead of a password:

# cme smb 10.0.5.1 -u Administrator -H 432b022dc22aa5afe884e986b8383ff2 -d . -M spooler
# cme smb 10.0.5.1 -u bkpadmin -H 432b022dc22aa5afe884e986b8383ff2 -d target.corp -M spooler
The spooler module can be also used against multiple hosts. Here's how to run it against multiple hosts:

# cme smb target_list.txt -u Administrator -p P@ss123 -d . -M spooler
# cme smb 10.0.5.0/24 -u Administrator -p P@ss123 -d . -M spooler
# cme smb 10.0.5.1-100 -u Administrator -p P@ss123 -d . -M spooler

References


Version


This page has been created based on CrackMapExec version 5.1.7dev.
Visit CrackMapExec Module Library for more modules.