NetExec

About

NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks. Usable for multiple protocols, such as smb, ssh, ldap, ftp, wmi, winrm, rdp, vnc, mssql, and nfs.

Github

Github Download

WIki

Usage

Logging

nxc PROTOCOL IP -u 'USER' -p 'PASSWORD' --log

SMB

General host info

nxc smb targets.txt

Enumerate Users

nxc smb IP -u USER -p 'PASSWORD' --users
nxc smb IP -u USER -p 'PASSWORD' --users-export users.txt

See what AV/EDR is running

Generate a list of relayable hosts (SMB Signing disabled)

Enumerate shares

Dumping hashes

Pass cmd

Pass powershell

Look at domain admins

Look at logged on users

View password policy

Enumerate SMB Shares testing for anonymous access

Perform a password spray

LDAP

Check for misconfigured Delegation

Machine Account Quota - Created rogue machine account for escalation

Enumerate Users/Groups

Test if an Account Exists without Kerberos. When using the option -k or โ€“use-kcache, you need to specify the same hostname (FQDN) as the one from the kerberos ticket

Test credentials

With valid creds, Enumerate users

ASREPRoasting exploits accounts that do not require Kerberos pre-authentication to extract service ticket hashes, which can then be cracked offline.

With a list of users

Kerberoasting extracts service account hashes by requesting service tickets for accounts with SPNs (Service Principal Names).

BloodHound ingestor is used to collect data for use in BloodHound, a tool for mapping AD attack paths.

Last updated