CrackMapExec icon indicating copy to clipboard operation
CrackMapExec copied to clipboard

Valid RDP credentials are not identified

Open Green360 opened this issue 1 year ago • 7 comments

I have installed the current version of crackmapexec (Version : 5.4.1, Codename: Indestructible G0thm0g) on Parrot OS via pipx.

There is a server that I can successfully connect to via proxychains and xfreerdp on port 3389:

$ proxychains xfreerdp /v:172.16.100.100 /u:user /p:'password' /cert:ignore /tls-ciphers:DEFAULT@SECLEVEL=0

However if I run crackmapexec, it just finishes without any output. I have only seen this behaviour when the host was not reachable but this should not be the case here as I can connect via xfreerdp.

$ proxychains crackmapexec rdp 172.16.100.100 -u user -p 'password'                                     
ProxyChains-3.1 (http://proxychains.sf.net)

Am I missing something?

If I run the command with "--verbose" the output gives me this:

...
'username': ['user'],
'verbose': True}
DEBUG:asyncio:Using selector: EpollSelector
DEBUG Using selector: EpollSelector
DEBUG:root:Running
DEBUG Running
DEBUG:root:Started thread poller
DEBUG Started thread poller
DEBUG:root:Stopped thread poller
DEBUG Stopped thread poller

The same server also has port 445 open and if I try the SMB option of crackmapexec I get the feedback that the credentials are not correct which is the expected output for SMB:

$proxychains crackmapexec smb 172.16.100.100 -u user -p 'password' -d test.local
ProxyChains-3.1 (http://proxychains.sf.net)
SMB         172.16.100.100   445    DEV04            [*] Windows 10.0 Build 20348 x64 (name:DEV04) (domain:test.local) (signing:False) (SMBv1:False)
SMB         172.16.100.100   445    DEV04            [-] test.local\user:password STATUS_LOGON_FAILURE 

Green360 avatar May 22 '23 22:05 Green360

try without proxychains

sec13b avatar Jun 18 '23 07:06 sec13b

Any updates on this? Was going through an HTB Academy lab and encountered a similar thing, except there was no pivoting involved. My debug output is no different from what's already been shown.

Currently on Kali 2023.2, installed crackmapexec via apt. Let me know if there's anything else that's needed to troubleshoot this. Tried decrypting the RDP traffic but Wireshark and Windows were being finnicky, so I might try again later.

An00bRektn avatar Jul 09 '23 20:07 An00bRektn

Hi this repository is deprecated. The new repository is at https://github.com/mpgn/CrackMapExec

Also the version on apt is currently months behind the current release. Can you try to install the new version and check if it works now? If not please open up a issue on the new repo. Installation: pipx install git+ https://github.com/mpgn/CrackMapExec

NeffIsBack avatar Jul 09 '23 23:07 NeffIsBack

This worked, thank you!

An00bRektn avatar Jul 10 '23 14:07 An00bRektn

Hi this repository is deprecated. The new repository is at https://github.com/mpgn/CrackMapExec

Also the version on apt is currently months behind the current release. Can you try to install the new version and check if it works now? If not please open up a issue on the new repo. Installation: pipx install git+ https://github.com/mpgn/CrackMapExec

Don't know why this repo has been linked as a current one, but it does not exist anymore. Moreover, the issue still persists in the latest version of CrackMapExec (5.4.0). Below is the screenshot, presenting the issue. Note, that in bottom right corner I succesffully connected with xfreerdp using the same credentials. image

nismo77 avatar Sep 08 '23 08:09 nismo77

5.4.0 is not the most recent version, 6.1.0 is. Since you're on Kali, uninstall CME with sudo apt remove crackmapexec, and then install using pipx as shown in this thread (using the Porchetta-Industries repo URL). If that doesn't give you 6.1.0, you might have to specify the specific branch or git commit, and you can find how to do that here: https://pypa.github.io/pipx/examples/

An00bRektn avatar Sep 08 '23 13:09 An00bRektn

5.4.0 is not the most recent version, 6.1.0 is. Since you're on Kali, uninstall CME with sudo apt remove crackmapexec, and then install using pipx as shown in this thread (using the Porchetta-Industries repo URL). If that doesn't give you 6.1.0, you might have to specify the specific branch or git commit, and you can find how to do that here: https://pypa.github.io/pipx/examples/

Hello, where can I get the standalone cme binary v6.1.0? I have literally looked everywhere and couldn't find it! https://github.com/mpgn/CrackMapExec <- This repo no longer exists.

init5-SF avatar Nov 18 '23 01:11 init5-SF