NetExec
About
NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks. Usable for multiple protocols, such as smb, ssh, ldap, ftp, wmi, winrm, rdp, vnc, mssql, and nfs.
Links
Usage
Logging
nxc PROTOCOL IP -u 'USER' -p 'PASSWORD' --logSMB
General host info
nxc smb targets.txtEnumerate Users
nxc smb IP -u USER -p 'PASSWORD' --users
nxc smb IP -u USER -p 'PASSWORD' --users-export users.txtSee what AV/EDR is running
Generate a list of relayable hosts (SMB Signing disabled)
Enumerate shares
Dumping hashes
Pass cmd
Pass powershell
Look at domain admins
Look at logged on users
View password policy
Enumerate SMB Shares testing for anonymous access
Perform a password spray
LDAP
Check for misconfigured Delegation
Machine Account Quota - Created rogue machine account for escalation
Enumerate Users/Groups
Test if an Account Exists without Kerberos. When using the option -k or โuse-kcache, you need to specify the same hostname (FQDN) as the one from the kerberos ticket
Test credentials
With valid creds, Enumerate users
ASREPRoasting exploits accounts that do not require Kerberos pre-authentication to extract service ticket hashes, which can then be cracked offline.
With a list of users
Kerberoasting extracts service account hashes by requesting service tickets for accounts with SPNs (Service Principal Names).
BloodHound ingestor is used to collect data for use in BloodHound, a tool for mapping AD attack paths.
Last updated