LogoLogo
NetExec Github
  • Welcome
  • News
    • ๐Ÿ•ท๏ธv1.0.0 Release!
    • ๐Ÿ”งv1.1.0 - nxc4u
    • ๐Ÿ“กv1.2.0 - ItsAlwaysDNS
    • ๐ŸŽ๏ธv1.3.0 - NeedForSpeed
    • ๐Ÿงˆv1.4.0 - SmoothOperator
  • Logo & Banner
  • Getting Started
    • Installation
      • ๐ŸงInstallation for Unix
      • ๐ŸชŸInstallation for Windows
      • ๐ŸŽInstallation for Mac
      • ๐Ÿ› ๏ธManually building the binary
      • โžก๏ธPost Installation Setup
    • Selecting & Using a Protocol
    • Target Formats
    • Using Credentials
    • Using Kerberos
    • Using Certificates
    • Using Modules
    • ๐Ÿ†•DNS options
    • Database General Usage
    • BloodHound Integration
    • Audit Mode
    • Ignore OpSec Warnings
    • Logging
  • SMB protocol
    • Generate hosts file
    • Generate krb5.conf file
    • Generate TGT
    • Scan for Vulnerabilities
    • Enumeration
      • Enumerate Hosts
      • Enumerate Null Sessions
      • Enumerate Guest Logon
      • Enumerate Hosts with SMB Signing Not Required
      • Enumerate Active SMB Sessions
      • Enumerate Shares and Access
      • ๐Ÿ†•Enumerate Network Interfaces
      • Enumerate Disks
      • Enumerate Bitlocker
      • Enumerate Logged on Users
      • Enumerate Domain Users
      • Enumerate Users by Bruteforcing RID
      • Enumerate Domain Groups
      • Enumerate Local Groups
      • Enumerate Domain Password Policy
      • ๐Ÿ†•Enumerate Anti-Virus & EDR
    • Password Spraying
    • Authentication
      • Checking Credentials (Domain)
      • Checking Credentials (Local)
      • ๐Ÿ†•Delegation
    • Command Execution
      • Executing Remote Commands
        • Process Injection (pi module)
      • Getting Shells 101
    • Spidering Shares
    • Get and Put Files
    • Obtaining Credentials
      • Dump SAM
      • Dump LSA
      • Dump NTDS.dit
      • Dump LSASS
      • Dump DPAPI
      • ๐Ÿ†•Dump with BackupOperator Priv
      • ๐Ÿ†•Dump SCCM
      • ๐Ÿ†•Dump Token Broker Cache
      • Dump WIFI password
      • Dump KeePass
      • Dump Veeam
      • Dump WinSCP
      • ๐Ÿ†•Dump PuTTY
      • ๐Ÿ†•Dump VNC
      • ๐Ÿ†•Dump mRemoteNG
      • ๐Ÿ†•Dump Notepad
      • ๐Ÿ†•Dump Notepad++
      • ๐Ÿ†•Dump Remote Desktop Credential Manager
    • Defeating LAPS
    • Checking for Spooler & WebDav
    • Steal Microsoft Teams Cookies
    • ๐Ÿ†•Impersonate logged-on Users
    • ๐Ÿ†•Change User Password
    • ๐Ÿ†•Dump User Local Security Questions
  • LDAP protocol
    • Authentication
    • Enumerate Domain Users
    • Enumerate Domain Groups
    • ๐Ÿ†•Query LDAP
    • ASREPRoast
    • Find Domain SID
    • Kerberoasting
    • ๐Ÿ†•Find Misconfigured Delegation
    • Unconstrained Delegation
    • Admin Count
    • Machine Account Quota
    • Get User Descriptions
    • Dump gMSA
    • Exploit ESC8 (ADCS)
    • Extract Subnet
    • ๐Ÿ› ๏ธCheck LDAP Signing
    • Read DACL Rights
    • Extract gMSA Secrets
    • Bloodhound Ingestor
    • List DC IP
    • Enumerate Domain Trusts
    • ๐Ÿ†•Enumerate SCCM
  • WINRM protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • ๐Ÿ†•Defeating LAPS
  • MSSQL protocol
    • Password Spraying
    • Authentication
    • MSSQL PrivEsc
    • MSSQL Command Execution
    • MSSQL Upload & Download
    • Execute via xp_cmdshell
    • ๐Ÿ†•Enumerate Users by Bruteforcing RID
  • SSH protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • Get and Put Files
  • FTP protocol
    • Password Spraying
    • ๐Ÿ†•File Listing, etc
    • ๐Ÿ†•File Upload & Download
  • RDP Protocol
    • Password Spraying
    • Screenshot (connected)
    • Screenshot Without NLA (not connected)
  • WMI Protocol
    • Password Spraying
    • Authentication
    • Command Execution
  • NFS Protocol
    • ๐Ÿ†•Enumeration
    • Download and Upload Files
    • ๐Ÿ†•Escape to root file system
Powered by GitBook
On this page
  • NeedForSpeed - NFS
  • SCCM LDAP Reconnaissance
  • coerce_plus Module
  • Identify Pre-Created Computer Accounts
  • Hunting for passwords in PowerShell Histories
  • Detection for the Guest Session
  • Retrieving networks and subnets via new SMB Interfaces flag
  • Enumerating BitLocker
  • Find Security Questions
  • Enumerate Hyper-V Hosts
  • Checks Regarding Defender AV via WCC Module
  • Smbghost Scanning Module
  • Outro

Was this helpful?

Edit on GitHub
  1. News

v1.3.0 - NeedForSpeed

Previousv1.2.0 - ItsAlwaysDNSNextv1.4.0 - SmoothOperator

Last updated 1 month ago

Was this helpful?

Hello everyone!

Recently, a lot of incredible Pull Requests have been submitted. Over 22 PRs in 2 weeks! This community activity is incredible, so be prepared for a lot of upcoming features, even if not all of them are included in this release.

Therefore, a big thank you to all the contributors in the past months. Of course, also a big thank you to people who have been submitting issues on github and our . This is very important to improve the stability and to ensure everything is working as expected.

NeedForSpeed - NFS

After quite some time, a new protocol has been added: NFS! This provides the ability to detect NFS servers, enumerate shares recursively. You can also download and upload files with the commands --get-file and --put-file respectively. Big thanks to for implementing this protocol, with the help of and .

SCCM LDAP Reconnaissance

coerce_plus Module

Identify Pre-Created Computer Accounts

Hunting for passwords in PowerShell Histories

Detection for the Guest Session

Retrieving networks and subnets via new SMB Interfaces flag

Enumerating BitLocker

Find Security Questions

Enumerate Hyper-V Hosts

Checks Regarding Defender AV via WCC Module

Smbghost Scanning Module

Outro

If you want to read about all changes in detail or download the latest standalone binaries check out the github page:

There has been a lot of recent research into Microsoft's System Center Configuration Manager (SCCM), also known as Microsoft Endpoint Configuration Manager (MECM). Therefore, developed a module to detect an SCCM environment in Active directory via LDAP! This will find SCCM Site-Servers, SCCM Sites, SCCM Management Points and Users, Computers or Groups related to SCCM.

The new coerce_plus module combines all 5 coercion methods (PetitPotam, DFSCoerce, MSEven, ShadowCoerce and PrinterBug). You can now check all these vulnerabilities with a single module, rather than one by one! If you want to coerce authentications with one of these techniques, just set a LISTENER ip. Made by .

Pre-WIndows 2000 computer accounts are valuable targets during engagements, as by default the password is set to the computer name. developed a module to identify these accounts and save a ccache for accounts, where the password was not changed. If you want to learn more, check out this great article at TrustedSec:

The Powershell History can be a goldmine for credentials. If admins forget to clear their history and passwords are typed in the console, they can be easily extracted. Thanks to we have a new module, which will check the history of all users on the target for keywords that might get you plaintext credentials.

Unsure about the anonymous authentication? NetExec now has a new flag to detect, if the guest session is active! Thanks to for nice idea.

The new SMB flag --interfaces will enumerate all interfaces on the target. Very useful to find subnets and servers for pivoting! Made by .

The new BitLocker module -M bitlocker is checking the BitLocker status on all drives. Also this module is available in both WMI and SMB! Made by .

This SMB module will dump security questions and answers for all users on the machine. Made by .

Hyper-V saves the Hostname of the hypervisor in the registry. With this module you can query that information from any target VMs. Made by

The WCC module got some new checks regarding Windows Defender settings. E.g. you can check if Defender has exclusions set for specific paths or file extensions. Made by .

With the new SMB module -M smbghost, you can check for prerequisits that have to be enabled for the SMBGhost vulnerability. Made by .

Notes by and

๐ŸŽ๏ธ
@NeffIsBack
@lodos2005
@Shad0wC0ntr0ller
https://trustedsec.com/blog/diving-into-pre-created-computer-accounts
@357384n
@Marshall-Hallenbeck
@Sant0rryu
@termanix
Adamkabadan
@joaovarelask
@jubeaz
@r4anan
Discord Server
@termanix
@Marshall-Hallenbeck
@NeffIsBack
@termanix
Alex
Release v1.3.0 ยท Pennyw0rth/NetExecGitHub
Logo