LogoLogo
Ctrlk
NetExec GithubNetexec Lab
  • Welcome
  • News
  • Logo & Banner
  • Netexec Lab
  • Getting Started
    • Installation
    • Selecting & Using a Protocol
    • Target Formats
    • Using Credentials
    • Using Kerberos
    • Using Certificates
    • Using Modules
    • DNS options
    • Database General Usage
    • BloodHound Integration
    • Audit Mode
    • Ignore OpSec Warnings
    • Logging
  • SMB protocol
    • Generate hosts file
    • Generate krb5.conf file
    • Generate TGT
    • Scan for Vulnerabilities
    • Enumeration
    • Password Spraying
    • Authentication
    • Command Execution
    • Spidering Shares
    • Get and Put Files
    • Obtaining Credentials
    • Defeating LAPS
    • Checking for Spooler & WebDav
    • Steal Microsoft Teams Cookies
    • Impersonate logged-on Users
    • Change User Password
    • Dump User Local Security Questions
  • LDAP protocol
    • Authentication
    • Enumerate Domain Users
    • Enumerate Domain Groups
    • 🆕Query LDAP
    • ASREPRoast
    • Find Domain SID
    • Kerberoasting
    • 🆕Find Misconfigured Delegation
    • Unconstrained Delegation
    • Admin Count
    • Machine Account Quota
    • Get User Descriptions
    • Dump gMSA
    • Exploit ESC8 (ADCS)
    • Extract Subnet
    • Check LDAP Signing
    • Read DACL Rights
    • Extract gMSA Secrets
    • Bloodhound Ingestor
    • 🆕List DC IP / Enum Trust
    • Enumerate Domain Trusts
    • 🆕Enumerate SCCM
    • 🆕Enumerate Entra ID
  • 🆕Dump PSO
  • WINRM protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • Defeating LAPS
    • Obtaining Credentials
  • MSSQL protocol
    • Password Spraying
    • Authentication
    • MSSQL PrivEsc
    • MSSQL Command Execution
    • MSSQL Upload & Download
    • Execute via xp_cmdshell
    • 🆕Enumerate Users by Bruteforcing RID
  • SSH protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • Get and Put Files
  • FTP protocol
    • Password Spraying
    • 🆕File Listing, etc
    • 🆕File Upload & Download
  • RDP Protocol
    • Password Spraying
    • Screenshot (connected)
    • Screenshot Without NLA (not connected)
    • 🆕Command Execution
  • WMI Protocol
    • Password Spraying
    • Authentication
    • Command Execution
  • NFS Protocol
    • 🆕Enumeration
    • Download and Upload Files
    • 🆕Escape to root file system
Powered by GitBook
On this page
  • Alternatives Tools
  • Resources:

Was this helpful?

Edit
  1. LDAP protocol

Unconstrained Delegation

NetExec allows you to retrieve the list of all computers and users with the flag TRUSTED_FOR_DELEGATION

nxc ldap 192.168.0.104 -u harry -p pass --trusted-for-delegation

Alternatives Tools

LogoGitHub - ropnop/windapsearch: Python script to enumerate users, groups and computers from a Windows domain through LDAP queriesGitHub
LogoPowerSploit/Recon/PowerView.ps1 at dev · PowerShellMafia/PowerSploitGitHub

Resources:

https://troopers.de/downloads/troopers19/TROOPERS19_AD_Fun_With_LDAP.pdftroopers.de
LogoUnconstrained Delegation - Risqueshackndo
“Relaying” Kerberos - Having fun with unconstrained delegationdirkjanm.io
LogoHunting in Active Directory: Unconstrained Delegation & Forests TrustsMedium
PreviousFind Misconfigured DelegationNextAdmin Count

Last updated 7 months ago

Was this helpful?