# v1.2.0 - ItsAlwaysDNS

Hello everyone!

It has been quite a while since the last release. We now have so many great features that a new release was long overdue. But first of all, a big thank you to all the contributors and people who have contributed ideas, submitted issues and participated on the [Discord server](https://discord.gg/pjwUTQzg8R). So let us dive into the long list of amazing new modules and features and start with our first big announcement.

<figure><img src="/files/qH02OhIEiiasVyYIBxwp" alt=""><figcaption><p>Woop woop</p></figcaption></figure>

## NetExec is available on Kali:rocket:

The biggest news first, thanks to the great help of [@arszilla ](https://x.com/arszilla)this release is also available on kali. After about 3 months of package updates on the Kali side everything is ready for the launch. So now you can just install the latest release with apt:

<figure><img src="/files/LOg8MoDSYnRuox913Cek" alt=""><figcaption><p>Installing NetExec with apt</p></figcaption></figure>

## It's Always DNS ...

... and that's why we now have fully integrated DNS options, thanks to [@XiaoliChan](https://x.com/Memory_before)! You can specify a DNS server with `--dns-server` or force TCP to be used for DNS with `--dns-tcp`. This also allows you to force IPv6 with `-6` and set a DNS timeout with `--dns-timeout`.

![Specifying a dns server](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/42925ec8-c693-48ae-9c02-bb4ef27a1b0a)

## It's Credential Looting Time💰

Ever heard of SCCM? You can now dump all SCCM credentials stored by the DPAPI with the new flag `--sccm`. Also there are a ton of new modules that loot various software which can store credentials like MobaXterm, mRemoteNG, some vnc server software and Google Refresh Tokens, thanks to [@zblurx](https://x.com/_zblurx)!

<figure><img src="https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/5301e0f8-39cf-4716-894f-75e8bd197f40" alt=""><figcaption><p>Looting SCCM</p></figcaption></figure>

<figure><img src="https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/be55049d-45cf-4b52-be81-502c2b6e0013" alt=""><figcaption><p>Looting MobaXterm</p></figcaption></figure>

<div data-full-width="false"><figure><img src="https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/3b919e10-6b67-414e-af11-000645e33d4e" alt=""><figcaption><p>Looting mRemoteNG</p></figcaption></figure></div>

<figure><img src="https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/ced41d32-e8ba-4463-af77-d2ce0d9801e8" alt=""><figcaption><p>Looting VNC</p></figcaption></figure>

## Looting PuTTY

Also credentials and RSA private keys stored in PuTTY can be looted thanks to an addition by [@NeffIsBack](https://x.com/al3x_n3ff).

<figure><img src="https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/0dd0c207-b244-4244-8668-f7587602453b" alt=""><figcaption><p>Looting RSA private keys and proxy credentials stored by PuTTY</p></figcaption></figure>

## Extract obsolete operating systems from LDAP

With the new LDAP module `-M obsolete` you can query for obsolete operating systems in LDAP! Made by [@Shad0wC0ntr0ller](https://x.com/Shad0wCntr0ller).

![image](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/5eb296e6-3ab4-4932-b7d3-69b88f7a2b7b)

## New LDAP flag for retrieving active Users on the Domain

The new LDAP Flag `--active-users` serves the same purpose as `--users`, but filters out deactivated accounts. Made by [@termanix](https://github.com/termanix).

![image](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/14e39eec-4342-404f-86ae-014c74d6de2d)

## New SMB Module Printerbug

The well-known coercion technique using Printerbug can now be exploited with NetExec, abusing MS-RPRN! Made by [@lodos2005](https://github.com/lodos2005).

<div data-full-width="false"><img src="https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/94a83b39-5bec-4934-931b-e33353dc4529" alt="Coercing authentications using NetExec and the new Printerbug module"></div>

![Relaying the incoming connection](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/bd0f18e7-3a94-421b-b763-1fc7445e7c60)

{% embed url="<https://www.thehacker.recipes/ad/movement/mitm-and-coerced-authentications/ms-rprn>" %}

## Hunt for the ADCS using SMB

A new SMB module is now available, that enumerates DCERPC endpoints for certsrv.exe, indicating that the server is a CA. It also enumerates whether the CA is vulnerable against ESC8. Made by [@0xjbb](https://github.com/0xjbb).

![Hunting for ADCS using SMB DCERPC](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/babcd4a5-c96d-4705-b164-d205e0f1b685)

## New LDAP Module Enumerate userPassword and unixUserPassword Attribute

There is software that will populate the LDAP attributes `userPassword` and `unixUserPassword` potentially with credentials in plaintext. The new LDAP modules `-M get-userPasswsord` and `-M get-unixUserPassword` will query all users for these attributes. Made by [@Syzik](https://x.com/SyzikSecu).

![image](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/a01986e8-62ee-496f-ae92-6cfc168a1f31)

## New Winlogon Autologon Module

Windows allows to configure user that will automatically log on to a machine on startup. With the new SMB module by [@swisskyrepo](https://x.com/pentest_swissky) you can now retrieve the content of the keys **DefaultDomainName, DefaultPassword, DefaultUserName, AutoAdminLogon** stored in the registry `HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon`, which are used for that logon process.

![Retrieve autologon credentials from the registry](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/dcaf5906-db93-409a-9937-dbf82ca728b6)

{% embed url="<https://learn.microsoft.com/en-us/troubleshoot/windows-server/user-profiles-and-logon/turn-on-automatic-logon>" %}

## Raw LDAP queries

There is now a new LDAP flag `--query "(Object)" "Filter"` with the standard ldapsearch syntax to be able to quickly look up attributes in LDAP. Made by [@NeffIsBack](https://x.com/al3x_n3ff).

![image](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/145e0573-bf1e-4e18-971b-3f098506c8e3)

## Updated LDAP and SMB User enumeration

SMB/LDAP `--users` and LDAP `--active-users` flags now allow filtering for specific users! Thanks to [@Marshall-Hallenbeck](https://x.com/MJHallenbeck).

<div data-full-width="false"><img src="https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/f191bd1f-af45-4cdc-bd84-e82b74bff502" alt=""> <img src="https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/e2c4e3eb-ec14-42a7-a895-2df852d2cfe1" alt=""></div>

![](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/28d9208f-b7be-4f06-9505-d1b76e6b4201)

## Updated PSO Module

[@sebrink](https://x.com/_sandw1ch) updated the pso module which retrieves all fine-grained password policies in the domain, giving the module a fresh new look and fixing a critical bug, where a policy wasn't displayed if it was attached to multiple obejcts.

![The new pso module](https://github.com/Pennyw0rth/NetExec-Wiki/assets/50464194/899e73df-e4b0-4db6-9de1-2527bff470d2)

## Authentication throttling

The old `--jitter` option got reworked to enable throttling of authentications. Super useful if you want to be a bit more stealthy or bypass lock out mechanisms. Made by [@NeffIsBack](https://x.com/al3x_n3ff).

## Tab-completion

Thanks to [@Adamkadaban](https://x.com/Adamkadaban) NetExec now supports tab-completion if installed with pipx! Check out the Installation page for the setup.

<figure><img src="/files/XhVG3rzqt32ZpXwzE6Ya" alt=""><figcaption><p>Tab-completion with NetExec</p></figcaption></figure>

## Rework of the Powershell command execution

A major overhaul of the powershell functionality within NetExec has taken place, fixing most bugs and improving overall usability and stability. Obfuscation and Amsi bypasses have also been set to non-default, as they were often flagged even by AVs. A nice side effect is that the `ps32` downgrade now bypasses Windows Defender😄\
Made by [@Marshall-Hallenbeck](https://x.com/MJHallenbeck).

<figure><img src="/files/k5FFX5NgwDxbAZMRYRhA" alt=""><figcaption><p>Bypassing Windows Defender with --force-ps32</p></figcaption></figure>

## Outro

If you want to read about all changes in detail or download the latest standalone binaries check out the github page:

{% embed url="<https://github.com/Pennyw0rth/NetExec/releases/tag/v1.2.0>" %}

*Notes by* \[[Alex](mailto:undefined)]\(<https://x.com/al3x\\_n3ff>)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.netexec.wiki/news/v1.2.0-itsalwaysdns.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
