Using Credentials
Using credentials with NetExec
Using Credentials
Every protocol supports using credentials in one form or another. For details on using credentials with a specific protocol, see the appropriate wiki section.
Generally speaking, to use credentials, you can run the following commands:
Code execution results in a (Pwn3d!) added after the login confirmation. With SMB protocol, most likely your compromised users are in the local administrators group.
FTP
No check
SSH
root (otherwise specific message) ✅
WINRM
Code execution at least 👾
LDAP
Path to domain admin 👑
SMB
Most likely local admin ✅
RDP
Code execution at least 👾
VNC
Code execution at least 👾
WMI
Most likely local admin ✅
When using usernames or passwords that contain special symbols (especially exclaimation points!), wrap them in single quotes to make your shell interpret them as a string.
Example:
Due to a bug in Python's argument parsing library, credentials beginning with a dash (-
) will throw an expected at least one argument
error message. To get around this, specify the credentials by using the 'long' argument format (note the =
sign):
Using a Credential Set From the Database
By specifying a credential ID (or multiple credential IDs) with the -id
flag nxc will automatically pull that credential from the back-end database and use it to authenticate (saves a lot of typing):
Multi-Domain Environment
You can use nxc with mulitple domain environment
Where FILE is a file with usernames in this format
Brute Forcing & Password Spraying
All protocols support brute-forcing and password spraying. For details on brute-forcing/password spraying with a specific protocol, see the appropriate wiki section.
By specifying a file or multiple values nxc will automatically brute-force logins for all targets using the specified protocol:
Examples:
Password Spraying Without Bruteforce
Can be usefull for protocols like WinRM and MSSQL. This option avoid the bruteforce when you use files (-u file -p file)
By default nxc will exit after a successful login is found. Using the --continue-on-success flag will continue spraying even after a valid password is found. Usefull for spraying a single password against a large user list. The --continue-on-success flag is incompatible with command execution.
Throttling Authentication Requests
Authentication throttling works on a per-host basis! Keep this in mind if you are spraying credentials against multiple hosts.
If there is a need to throttle authentications during brute forcing, you can use the jitter functionality. The length of the timeout (in seconds) between requests is randomly selected from an interval unless otherwise specified. If you want to hardcode the timeout, set the upper and lower bounds of the interval to the same value. The syntax is as follows:
Last updated