LogoLogo
Ctrlk
NetExec Github
  • Welcome
  • News
  • Logo & Banner
  • Getting Started
    • Installation
    • Selecting & Using a Protocol
    • Target Formats
    • Using Credentials
    • Using Kerberos
    • Using Certificates
    • Using Modules
    • DNS options
    • Database General Usage
    • BloodHound Integration
    • Audit Mode
    • Ignore OpSec Warnings
    • Logging
  • SMB protocol
    • Generate hosts file
    • Generate krb5.conf file
    • Generate TGT
    • Scan for Vulnerabilities
    • Enumeration
      • Enumerate Hosts
      • Enumerate Null Sessions
      • Enumerate Guest Logon
      • Enumerate Hosts with SMB Signing Not Required
      • 🆕Enumerate Active Windows Sessions
      • 🆕Enumerate Logged-On Users with the Remote Registry Service
      • Enumerate Logged-On Users with the Workstation Service
      • Enumerate Shares and Access
      • 🆕Enumerate Network Interfaces
      • Enumerate Disks
      • Enumerate Bitlocker
      • Enumerate Domain Users
      • Enumerate Users by Bruteforcing RID
      • Enumerate Domain Groups
      • Enumerate Local Groups
      • Enumerate Domain Password Policy
      • Enumerate Anti-Virus & EDR
      • Enumerate remote processes
      • 🆕Enumerate changed lockscreen executables
      • 🆕Enumerate Primary Site Server and Distribution Point via recon6
    • Password Spraying
    • Authentication
    • Command Execution
    • Spidering Shares
    • Get and Put Files
    • Obtaining Credentials
    • Defeating LAPS
    • Checking for Spooler & WebDav
    • Steal Microsoft Teams Cookies
    • Impersonate logged-on Users
    • Change User Password
    • Dump User Local Security Questions
  • LDAP protocol
    • Authentication
    • Enumerate Domain Users
    • Enumerate Domain Groups
    • 🆕Query LDAP
    • ASREPRoast
    • Find Domain SID
    • Kerberoasting
    • 🆕Find Misconfigured Delegation
    • Unconstrained Delegation
    • Admin Count
    • Machine Account Quota
    • Get User Descriptions
    • Dump gMSA
    • Exploit ESC8 (ADCS)
    • Extract Subnet
    • Check LDAP Signing
    • Read DACL Rights
    • Extract gMSA Secrets
    • Bloodhound Ingestor
    • 🆕List DC IP / Enum Trust
    • Enumerate Domain Trusts
    • 🆕Enumerate SCCM
    • 🆕Enumerate Entra ID
  • 🆕Dump PSO
  • WINRM protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • Defeating LAPS
  • MSSQL protocol
    • Password Spraying
    • Authentication
    • MSSQL PrivEsc
    • MSSQL Command Execution
    • MSSQL Upload & Download
    • Execute via xp_cmdshell
    • 🆕Enumerate Users by Bruteforcing RID
  • SSH protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • Get and Put Files
  • FTP protocol
    • Password Spraying
    • 🆕File Listing, etc
    • 🆕File Upload & Download
  • RDP Protocol
    • Password Spraying
    • Screenshot (connected)
    • Screenshot Without NLA (not connected)
    • 🆕Command Execution
  • WMI Protocol
    • Password Spraying
    • Authentication
    • Command Execution
  • NFS Protocol
    • 🆕Enumeration
    • Download and Upload Files
    • 🆕Escape to root file system
Powered by GitBook
On this page

Was this helpful?

Edit
  1. SMB protocol

Enumeration

Enumeration on NetExec

The following use cases assume you have a Kali Linux host connected to an internal network.

For the examples it is also assumed hosts are within a 192.168.1.0/24 IP space.

If nxc isnt giving output of any kind, you probably have something wrong with the command.

Enumerate HostsEnumerate Null SessionsEnumerate Guest LogonEnumerate Hosts with SMB Signing Not RequiredEnumerate Shares and AccessEnumerate Disks🆕Enumerate Logged-On Users with the Remote Registry ServiceEnumerate Domain UsersEnumerate Users by Bruteforcing RIDEnumerate Domain GroupsEnumerate Local GroupsEnumerate Domain Password PolicyEnumerate Hosts with SMB Signing Not Requiredhttps://github.com/Pennyw0rth/NetExec-Wiki/blob/main/smb-protocol/enumeration/enumerate-sccm-primarysiteserver-and-distributionpoint.md
PreviousScan for VulnerabilitiesNextEnumerate Hosts

Last updated 1 month ago

Was this helpful?