Cyber Research Wiki

CrackMapExec (CME)

Open-source post-exploitation and lateral movement framework for automating credential validation, enumeration, and command execution across Windows/Active Directory networks over protocols like SMB, WinRM/WMI, MSSQL, and LDAP.

Overview

CrackMapExec (CME) is an offensive security framework oriented toward post-exploitation and internal network assessment in Windows and Active Directory environments. It consolidates enterprise-scale actions that are otherwise fragmented across protocol-specific tools: credential validation and reuse, host and domain enumeration, share and service discovery, and remote command execution. CME integrates protocol backends with a plug-in module system to collect artifacts and orchestrate post-exploitation activities while presenting consolidated results across many hosts and credential sets. Originally created by Marcello (@byt3bl33d3r) and subsequently maintained by community contributors, active stewardship and feature development shifted in 2023–2024 to the community-driven successor NetExec (nxc). CME remains widely recognized in documentation and practice, while NetExec receives ongoing updates.

What It Is

CME is a post-exploitation and lateral movement framework for Windows/AD networks that provides a unified interface to authenticate over multiple enterprise protocols and conduct credential-based actions at scale. It is used in red-team and internal penetration tests, in purple-team labs for validating detections, and by defenders studying recognizable execution patterns for detection engineering.

How It Works

CME implements protocol-specific backends that encapsulate common Windows/AD service interactions. Over SMB, it performs authentication, service interaction, and remote execution workflows. WinRM and WMI paths enable remote command execution where policy and permissions permit. MSSQL support can execute queries and, when misconfigurations allow, trigger command execution mechanisms such as xp_cmdshell. LDAP backends drive domain reconnaissance, including enumeration of users, groups, SPNs, and other directory attributes relevant to privilege analysis, as well as Kerberoasting and ASREPRoasting tasks where permitted. A module system extends functionality to collect and process artifacts such as network shares, Group Policy Preferences secrets, LAPS, DPAPI and LSA materials, and BloodHound-compatible data; exact availability and behavior vary by version. Historically, CME has relied on Windows/AD protocol operations provided by libraries in the Impacket ecosystem, enabling traffic patterns that resemble normal domain activity. The framework is designed to operate across large host sets and multiple credential types (passwords, hashes, or tickets), aggregating authentication outcomes, access levels, command outputs, and collected data into consumable results that guide subsequent assessment or detection work.

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

medium