netexec
NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks.
Details
Category: Network
Publisher: trickest-mhmdiaa
Created Date: 7/18/2024
Container: quay.io/trickest/netexec:3a5c109
Source URL: https://github.com/Pennyw0rth/NetExec
Parameters
Command:
-id
- database credential ID(s) to use for authenticationCommand:
--ls
- List files in the directoryCommand:
--lsa
- dump LSA secrets from target systemsCommand:
--pvk
- DPAPI option. File with domain backupkeyCommand:
--sam
- dump SAM hashes from target systemsCommand:
--wmi
- issues the specified WMI queryCommand:
--gmsa
- Enumerate GMSA passwordsCommand:
--hash
- NTLM hash(es)Command:
-6
- Enable force IPv6Command:
--ntds
- dump the NTDS.dit from target DCs using the specifed method (drsuapi,vss)Command:
--port
- Target portCommand:
--sccm
- dump SCCM secrets from target systems (wmi,disk)Command:
--user
- Dump selected user from DCCommand:
--codec
- Set encoding used (codec) from the target's output. If errors are detected, run chcp.com at the target & map the result with https://docs.python.org/3/library/codecs.html#standard-encodings and then execute again with --codec and the corresponding codec (default: utf-8)Command:
--debug
- enable debug level informationCommand:
--depth
- max spider recursion depthCommand:
--disks
- enumerate disksCommand:
--dpapi
- dump DPAPI secrets from target systems, can dump cookies if you add 'cookies', will not dump SYSTEM dpapi if you add nosystem (cookies,nosystem)Command:
--query
- execute the specfied query against the targetCommand:
--regex
- regex(s) to search for in folders, filenames and file contentCommand:
--users
- enumerate domain users, if a user is specified than only its information is queried.Command:
-d
- domain to authenticate toCommand:
--groups
- enumerate domain groups, if a group is specified than its members are enumeratedCommand:
--hash
- file containing NTLM hashesCommand:
--jitter
- sets a random delay between each authenticationCommand:
--mkfile
- DPAPI option. File with masterkeys in form of {GUID}:SHA1Command:
--module
- module to useCommand:
--no-smb
- No smb connectionCommand:
--server
- use the selected server (default: https)Command:
--shares
- enumerate shares and accessCommand:
--spider
- share to spiderCommand:
- the target IP, range, CIDR, hostname, or FQDNCommand:
--aesKey
- AES key to use for Kerberos Authentication (128 or 256 bits)Command:
-x
- execute the specified commandCommand:
--content
- enable file content searchingCommand:
--dns-tcp
- Use TCP instead of UDP for DNS queriesCommand:
--enabled
- Only dump enabled targets from DCCommand:
--get-sid
- Get domain sidCommand:
--pattern
- pattern(s) to search for in folders, filenames and file contentCommand:
- a list of target IP(s), range(s), CIDR(s), hostname(s), FQDN(s), NMap XML or .Nessus file(s)'Command:
--threads
- set how many concurrent threads to useCommand:
--timeout
- max timeout in seconds of each threadCommand:
--verbose
- enable verbose outputCommand:
--kerberos
- Use Kerberos authenticationCommand:
--pass-pol
- dump password policyCommand:
--password
- passwordCommand:
- the network protocol to assess (available protocols: ldap, mssql, smb, wmi, ssh, vnc, ftp, winrm, rdp)Command:
--sessions
- enumerate active sessionsCommand:
--username
- usernameCommand:
--computers
- enumerate computer userCommand:
--password
- file containing passwordsCommand:
--username
- file containing usernamesCommand:
--bloodhound
- Perform a Bloodhound scanCommand:
--collection
- Which information to collect. Supported: Group, LocalAdmin, Session, Trusts, Default, DCOnly, DCOM, RDP, PSRemote, LoggedOn, Container, ObjectProps, ACL, All. You can specify more than one by separating them with a comma (default: Default)Command:
--dns-server
- Specify DNS server (default: Use hosts file & System DNS)Command:
--force-ps32
- Force the PowerShell command to run in a 32-bit process via a job; WARNING: depends on the job completing quickly, so you may have to increase the timeoutCommand:
--interfaces
- enumerate network interfacesCommand:
--local-auth
- authenticate locally to each targetCommand:
--only-files
- only spider filesCommand:
--use-kcache
- Use Kerberos authentication from ccache file (KRB5CCNAME)Command:
--admin-count
- Get objets that had the value adminCount=1Command:
--amsi-bypass
- File with a custom AMSI bypassCommand:
--dns-timeout
- DNS query timeout in secondsCommand:
--dump-method
- Select shell type in hashes dump (default: cmd) (cmd,powershell)Command:
--exec-method
- method to execute the command. Ignored if in MSSQL mode (default: wmiexec) (smbexec,wmiexec,atexec,mmcexec)Command:
--no-progress
- do not displaying progress bar during scanCommand:
--server-host
- IP to bind the server to (default: 0.0.0.0)Command:
--server-port
- start the server on the specified portCommand:
--active-users
- Get Active Domain Users AccountsCommand:
--dcom-timeout
- DCOM connection timeout (default: 5)Command:
--exclude-dirs
- directories to exclude from spideringCommand:
--list-modules
- list available modulesCommand:
--local-groups
- enumerate local groups, if a group is specified then its members are enumeratedCommand:
--filter-shares
- Filter share by access, option 'read' 'write' or 'read,write'Command:
--mssql-timeout
- SQL server connection timeout (default: 5)Command:
--no-bruteforce
- No spray when using file for username and password (user1 => password1, user2 => password2)Command:
--rid-brute
- specify max RID to enumerate users by bruteforcing RIDsCommand:
--spider-folder
- folder to spider (default: .)Command:
--wmi-namespace
- WMI Namespace (default: rootcimv2)Command:
--loggedon-users
- enumerate logged on usersCommand:
-o
- module optionsCommand:
--no-write-check
- Skip write check on shares (avoid leaving traces when missing delete permissions)Command:
--gmsa-convert-id
- Get the secret name of specific gmsa or all gmsa if no gmsa providedCommand:
--fail-limit
- max number of failed login attempts per hostCommand:
--connectback-host
- IP for the remote system to connect back toCommand:
--get-output-tries
- Number of times atexec/smbexec/mmcexec tries to get results (default: 10)Command:
--gmsa-decrypt-lsa
- Decrypt the gmsa encrypted value from LSACommand:
--gfail-limit
- max number of global failed login attemptsCommand:
--no-output
- do not retrieve command outputCommand:
--ignore-pw-decoding
- Ignore non UTF-8 characters when decoding the password fileCommand:
-X
- execute the specified PowerShell commandCommand:
--continue-on-success
- continues authentication attempts even after successesCommand:
--ufail-limit
- max number of failed login attempts per usernameCommand:
--no-encode
- Do not encode the PowerShell command ran on targetCommand:
--obfs
- Obfuscate PowerShell ran on target; WARNING: Defender will almost certainly trigger on thisCommand:
--options
- display module optionsCommand:
--loggedon-users-filter
- only search for specific user, works with regexCommand:
--password-not-required
- Get the list of users with flag PASSWD_NOTREQDCommand:
--trusted-for-delegation
- Get the list of users and computers with flag TRUSTED_FOR_DELEGATIONCommand:
--dc-list
- Enumerate Domain ControllersCommand:
--clear-obfscripts
- Clear all cached obfuscated PowerShell scriptsCommand:
--kdcHost
- FQDN of the domain controller. If omitted it will use the domain part (FQDN) specified in the target parameter