netexec
Last updated
Was this helpful?
Last updated
Was this helpful?
(nxc
) is a network service exploitation tool that helps automate assessing the security of large networks. An amazing tool that makes enumerating and exploiting Active Directory (AD) environments exponentially more efficient! You can view its usage in almost any of the .
Enumerate domain/local users:
Domain users can be also be enumerated via a RID-bruteforcing attack:
Enumerate domain/local hosts:
If the results include the domain
, e.g. (seruca.yzx
) → a domain account.
If it has (Pw3d!)
at the end → Local Administrator
account.
If large files are failing/erroring, add --smb-timeout
with a value than 2.
asdas
The hash format that starts with $DCC2$
(derived from --lsa
) is stronger than NTLM and cannot be used for a PtH attack. For attempting to crack them, the domain and username needs to be removed; only the value starting with $DCC2$
is required.
Two methods can be used to authenticate to MSSQL: Windows (default) & local auth:
Ports can be also be specified:
For stealing hashes via writeable shares via SMB using slinky
, drop-sc
, or scuffy
check .