LogoLogo
NetExec Github
  • Welcome
  • News
    • 🕷️v1.0.0 Release!
    • 🔧v1.1.0 - nxc4u
    • 📡v1.2.0 - ItsAlwaysDNS
    • 🏎️v1.3.0 - NeedForSpeed
    • 🧈v1.4.0 - SmoothOperator
  • Logo & Banner
  • Getting Started
    • Installation
      • 🐧Installation for Unix
      • 🪟Installation for Windows
      • 🍎Installation for Mac
      • 🛠️Manually building the binary
      • ➡️Setting up Tab Completion
    • Selecting & Using a Protocol
    • Target Formats
    • Using Credentials
    • Using Kerberos
    • Using Certificates
    • Using Modules
    • 🆕DNS options
    • Database General Usage
    • BloodHound Integration
    • Audit Mode
    • Ignore OpSec Warnings
    • Logging
  • SMB protocol
    • Generate hosts file
    • Generate krb5.conf file
    • Generate TGT
    • Scan for Vulnerabilities
    • Enumeration
      • Enumerate Hosts
      • Enumerate Null Sessions
      • Enumerate Guest Logon
      • Enumerate Hosts with SMB Signing Not Required
      • Enumerate Active SMB Sessions
      • Enumerate Shares and Access
      • 🆕Enumerate Network Interfaces
      • Enumerate Disks
      • Enumerate Bitlocker
      • Enumerate Logged on Users
      • Enumerate Domain Users
      • Enumerate Users by Bruteforcing RID
      • Enumerate Domain Groups
      • Enumerate Local Groups
      • Enumerate Domain Password Policy
      • 🆕Enumerate Anti-Virus & EDR
    • Password Spraying
    • Authentication
      • Checking Credentials (Domain)
      • Checking Credentials (Local)
      • 🆕Delegation
    • Command Execution
      • Executing Remote Commands
        • Process Injection (pi module)
      • Getting Shells 101
    • Spidering Shares
    • Get and Put Files
    • Obtaining Credentials
      • Dump SAM
      • Dump LSA
      • Dump NTDS.dit
      • Dump LSASS
      • Dump DPAPI
      • 🆕Dump with BackupOperator Priv
      • 🆕Dump SCCM
      • 🆕Dump Token Broker Cache
      • Dump WIFI password
      • Dump KeePass
      • Dump Veeam
      • Dump WinSCP
      • 🆕Dump PuTTY
      • 🆕Dump VNC
      • 🆕Dump mRemoteNG
      • 🆕Dump Notepad
      • 🆕Dump Notepad++
      • 🆕Dump Remote Desktop Credential Manager
    • Defeating LAPS
    • Checking for Spooler & WebDav
    • Steal Microsoft Teams Cookies
    • 🆕Impersonate logged-on Users
    • 🆕Change User Password
    • 🆕Dump User Local Security Questions
  • LDAP protocol
    • Authentication
    • Enumerate Domain Users
    • Enumerate Domain Groups
    • 🆕Query LDAP
    • ASREPRoast
    • Find Domain SID
    • Kerberoasting
    • 🆕Find Misconfigured Delegation
    • Unconstrained Delegation
    • Admin Count
    • Machine Account Quota
    • Get User Descriptions
    • Dump gMSA
    • Exploit ESC8 (ADCS)
    • Extract Subnet
    • Check LDAP Signing
    • Read DACL Rights
    • Extract gMSA Secrets
    • Bloodhound Ingestor
    • List DC IP
    • Enumerate Domain Trusts
    • 🆕Enumerate SCCM
  • WINRM protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • 🆕Defeating LAPS
  • MSSQL protocol
    • Password Spraying
    • Authentication
    • MSSQL PrivEsc
    • MSSQL Command Execution
    • MSSQL Upload & Download
    • Execute via xp_cmdshell
    • 🆕Enumerate Users by Bruteforcing RID
  • SSH protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • Get and Put Files
  • FTP protocol
    • Password Spraying
    • 🆕File Listing, etc
    • 🆕File Upload & Download
  • RDP Protocol
    • Password Spraying
    • Screenshot (connected)
    • Screenshot Without NLA (not connected)
  • WMI Protocol
    • Password Spraying
    • Authentication
    • Command Execution
  • NFS Protocol
    • 🆕Enumeration
    • Download and Upload Files
    • 🆕Escape to root file system
Powered by GitBook
On this page
  • NetExec is available on Kali
  • It's Always DNS ...
  • It's Credential Looting Time💰
  • Looting PuTTY
  • Extract obsolete operating systems from LDAP
  • New LDAP flag for retrieving active Users on the Domain
  • New SMB Module Printerbug
  • Hunt for the ADCS using SMB
  • New LDAP Module Enumerate userPassword and unixUserPassword Attribute
  • New Winlogon Autologon Module
  • Raw LDAP queries
  • Updated LDAP and SMB User enumeration
  • Updated PSO Module
  • Authentication throttling
  • Tab-completion
  • Rework of the Powershell command execution
  • Outro

Was this helpful?

Edit on GitHub
  1. News

v1.2.0 - ItsAlwaysDNS

NetExec v1.2.0 feature rundown

Previousv1.1.0 - nxc4uNextv1.3.0 - NeedForSpeed

Last updated 3 days ago

Was this helpful?

Hello everyone!

It has been quite a while since the last release. We now have so many great features that a new release was long overdue. But first of all, a big thank you to all the contributors and people who have contributed ideas, submitted issues and participated on the discord server. So let us dive into the long list of amazing new modules and features and start with our first big announcement.

NetExec is available on Kali

It's Always DNS ...

It's Credential Looting Time💰

Looting PuTTY

Extract obsolete operating systems from LDAP

New LDAP flag for retrieving active Users on the Domain

New SMB Module Printerbug

Hunt for the ADCS using SMB

New LDAP Module Enumerate userPassword and unixUserPassword Attribute

New Winlogon Autologon Module

Raw LDAP queries

Updated LDAP and SMB User enumeration

Updated PSO Module

Authentication throttling

Tab-completion

Rework of the Powershell command execution

Outro

If you want to read about all changes in detail or download the latest standalone binaries check out the github page:

The biggest news first, thanks to the great help of this release is also available on kali. After about 3 months of package updates on the Kali side everything is ready for the launch. So now you can just install the latest release with apt:

... and that's why we now have fully integrated DNS options, thanks to ! You can specify a DNS server with --dns-server or force TCP to be used for DNS with --dns-tcp. This also allows you to force IPv6 with -6 and set a DNS timeout with --dns-timeout.

Specifying a dns server

Ever heard of SCCM? You can now dump all SCCM credentials stored by the DPAPI with the new flag --sccm. Also there are a ton of new modules that loot various software which can store credentials like MobaXterm, mRemoteNG, some vnc server software and Google Refresh Tokens, thanks to !

Looting SCCM
Looting MobaXterm
Looting mRemoteNG
Looting VNC

Also credentials and RSA private keys stored in PuTTY can be looted thanks to an addition by .

Looting RSA private keys and proxy credentials stored by PuTTY

With the new LDAP module -M obsolete you can query for obsolete operating systems in LDAP! Made by .

image

The new LDAP Flag --active-users serves the same purpose as --users, but filters out deactivated accounts. Made by .

image

The well-known coercion technique using Printerbug can now be exploited with NetExec, abusing MS-RPRN! Made by .

Coercing authentications using NetExec and the new Printerbug module
Relaying the incoming connection

A new SMB module is now available, that enumerates DCERPC endpoints for certsrv.exe, indicating that the server is a CA. It also enumerates whether the CA is vulnerable against ESC8. Made by .

Hunting for ADCS using SMB DCERPC

There is software that will populate the LDAP attributes userPassword and unixUserPassword potentially with credentials in plaintext. The new LDAP modules -M get-userPasswsord and -M get-unixUserPassword will query all users for these attributes. Made by .

image

Windows allows to configure user that will automatically log on to a machine on startup. With the new SMB module by you can now retrieve the content of the keys DefaultDomainName, DefaultPassword, DefaultUserName, AutoAdminLogon stored in the registry HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon, which are used for that logon process.

Retrieve autologon credentials from the registry

There is now a new LDAP flag --query "(Object)" "Filter" with the standard ldapsearch syntax to be able to quickly look up attributes in LDAP. Made by .

image

SMB/LDAP --users and LDAP --active-users flags now allow filtering for specific users! Thanks to .

updated the pso module which retrieves all fine-grained password policies in the domain, giving the module a fresh new look and fixing a critical bug, where a policy wasn't displayed if it was attached to multiple obejcts.

The new pso module

The old --jitter option got reworked to enable throttling of authentications. Super useful if you want to be a bit more stealthy or bypass lock out mechanisms. Made by .

Thanks to NetExec now supports tab-completion if installed with pipx! Check out the Installation page for the setup.

A major overhaul of the powershell functionality within NetExec has taken place, fixing most bugs and improving overall usability and stability. Obfuscation and Amsi bypasses have also been set to non-default, as they were often flagged even by AVs. A nice side effect is that the ps32 downgrade now bypasses Windows Defender😄 Made by .

Notes by

@arszilla
@XiaoliChan
@zblurx
@NeffIsBack
@Shad0wC0ntr0ller
@termanix
@lodos2005
@0xjbb
@Syzik
@swisskyrepo
@NeffIsBack
@Marshall-Hallenbeck
@sebrink
@NeffIsBack
@Adamkadaban
@Marshall-Hallenbeck
📡
🚀
MS-RPRN abuse (PrinterBug)The Hacker Recipes
Configure Windows to automate logon - Windows ServerMicrosoftLearn
Logo
Release v1.2.0 · Pennyw0rth/NetExecGitHub
Alex
Woop woop
Installing NetExec with apt
Tab-completion with NetExec
Bypassing Windows Defender with --force-ps32
Page cover image
Logo
Logo