Netexec
https://www.netexec.wiki/
Viewing Available Protocols
#~ nxc --help
usage: nxc [-h] [-t THREADS] [--timeout TIMEOUT] [--jitter INTERVAL] [--no-progress] [--verbose] [--debug] [--version] {smb,ssh,ldap,ftp,wmi,winrm,rdp,vnc,mssql} ...
<-- Banner -->
options:
-h, --help show this help message and exit
-t THREADS set how many concurrent threads to use (default: 100)
--timeout TIMEOUT max timeout in seconds of each thread (default: None)
--jitter INTERVAL sets a random delay between each connection (default: None)
--no-progress Not displaying progress bar during scan
--verbose enable verbose output
--debug enable debug level information
--version Display nxc version
protocols:
available protocols
{smb,ssh,ldap,ftp,wmi,winrm,rdp,vnc,mssql,nfs}
smb own stuff using SMB
ssh own stuff using SSH
ldap own stuff using LDAP
ftp own stuff using FTP
wmi own stuff using WMI
winrm own stuff using WINRM
rdp own stuff using RDP
vnc own stuff using VNC
mssql own stuff using MSSQL
nfs own stuff using NFSTarget Formats
Using Credentials
Protocol
See Pwn3d! in output
Using a Credential Set From the Database
Multi-Domain Environment
Brute Forcing & Password Spraying
Password Spraying Without Bruteforce
Throttling Authentication Requests
Using Kerberos
Using Modules
Viewing Available Modules for a Protocol
Using a Module
Viewing Module Options
Using Module Options
π Running Multiple Modules
Scan for Vulnerabilities
Scan for Coerce Vulnerabilities
Map Network Hosts
Enumerate Null Sessions
Example
Enumerate Guest Logon
Example
Enumerate Hosts with SMB Signing Not Required
Alternative with nmap
Enumerate Active Sessions
Enumerate Shares and Access
Enumerate Network Interfaces

Enumerate Disks
Enumerate Logged on Users
Enumerate Domain Users
Enumerate Users by Bruteforcing RID
Enumerate Domain Groups
Enumerate Local Groups
Enumerate Domain Password Policy
Enumerate Anti-Virus & EDR
Password Spraying
Using Username/Password Lists
Checking 'username == password' using wordlist
Checking multiple usernames/passwords using wordlist
Checking one login equal one password using wordlist
Checking Credentials (Domain)
Authentication
User/Password
User/Hash
Checking Credentials (Local)
User/Password/Hashes
Delegation
RBCD
S4U2Self
Resources:
Executing Remote Commands
Command Execution
Execution Methods
Executing Commands
Bypass AMSI
Getting Shells 101
Getting Shells 101
Empire Agent
Meterpreter
Spidering Shares
Using Default Option --spider
--spiderUsing Module "spider_plus"
List all readable files
Dumping All Files
Get and Put Files
Send a File to the Remote Target
Get a File From the Remote Target
Last updated

