LogoLogo
search
Ctrlk
NetExec GithubNetexec Lab
  • Welcome
  • Newschevron-right
  • Logo & Banner
  • flask-vialNetExec Lab
  • Getting Started
    • Installationchevron-right
    • Selecting & Using a Protocol
    • Target Formats
    • Using Credentials
    • Using Kerberos
    • Using Certificates
    • Using Modules
    • DNS options
    • Database General Usage
    • BloodHound Integration
    • Audit Mode
    • Ignore OpSec Warnings
    • Logging
  • SMB protocol
    • Generate hosts file
    • Generate krb5.conf file
    • Generate TGT
    • Scan for Vulnerabilities
    • Enumerationchevron-right
      • Enumerate Hosts
      • Enumerate Null Sessions
      • Enumerate Guest Logon
      • Enumerate Hosts with SMB Signing Not Required
      • 🆕Enumerate Active Windows Sessions
      • 🆕Enumerate Logged-On Users with the Remote Registry Service
      • Enumerate Logged-On Users with the Workstation Service
      • Enumerate Shares and Access
      • 🆕Enumerate Network Interfaces
      • Enumerate Disks
      • Enumerate Bitlocker
      • Enumerate Domain Users
      • Enumerate Users by Bruteforcing RID
      • Enumerate Domain Groups
      • Enumerate Local Groups
      • Enumerate Domain Password Policy
      • Enumerate Anti-Virus & EDR
      • Enumerate remote processes
      • 🆕Enumerate changed lockscreen executables
      • 🆕Enumerate Primary Site Server and Distribution Point via recon6
    • Password Spraying
    • Authenticationchevron-right
    • Command Executionchevron-right
    • Spidering Shares
    • Get and Put Files
    • Obtaining Credentialschevron-right
    • Defeating LAPS
    • Checking for Spooler & WebDav
    • Steal Microsoft Teams Cookies
    • Impersonate logged-on Users
    • Change User Password
    • Dump User Local Security Questions
  • LDAP protocol
    • Authentication
    • Enumerate Domain Users
    • Enumerate Domain Groups
    • 🆕Query LDAP
    • ASREPRoast
    • Find Domain SID
    • Kerberoasting
    • 🆕Find Misconfigured Delegation
    • Unconstrained Delegation
    • Admin Count
    • Machine Account Quota
    • Get User Descriptions
    • Dump gMSA
    • Exploit ESC8 (ADCS)
    • Extract Subnet
    • Check LDAP Signing
    • Read DACL Rights
    • Extract gMSA Secrets
    • Bloodhound Ingestor
    • 🆕List DC IP / Enum Trust
    • 🆕Abuse Domain Trust: Raisechild
    • Enumerate Domain Trusts
    • 🆕Enumerate SCCM
    • 🆕Enumerate Entra ID
  • 🆕Dump PSO
  • WINRM protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • Defeating LAPS
    • Obtaining Credentialschevron-right
  • MSSQL protocol
    • Password Spraying
    • Authentication
    • MSSQL PrivEsc
    • MSSQL Command Execution
    • MSSQL Upload & Download
    • Execute via xp_cmdshell
    • 🆕Enumerate Users by Bruteforcing RID
    • MSSQL Linked Servers
  • SSH protocol
    • Password Spraying
    • Authentication
    • Command Execution
    • Get and Put Files
  • FTP protocol
    • Password Spraying
    • 🆕File Listing, etc
    • 🆕File Upload & Download
  • RDP Protocol
    • Password Spraying
    • Screenshot (connected)
    • Screenshot Without NLA (not connected)
    • 🆕Command Execution
  • WMI Protocol
    • Password Spraying
    • Authentication
    • Command Execution
  • NFS Protocol
    • 🆕Enumeration
    • Download and Upload Files
    • 🆕Escape to root file system
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. SMB protocol

Enumeration

Enumeration on NetExec

The following use cases assume you have a Kali Linux host connected to an internal network.

For the examples it is also assumed hosts are within a 192.168.1.0/24 IP space.

If nxc isnt giving output of any kind, you probably have something wrong with the command.

Enumerate Hostschevron-rightEnumerate Null Sessionschevron-rightEnumerate Guest Logonchevron-rightEnumerate Hosts with SMB Signing Not Requiredchevron-rightEnumerate Shares and Accesschevron-rightEnumerate Diskschevron-right🆕Enumerate Logged-On Users with the Remote Registry Servicechevron-rightEnumerate Domain Userschevron-rightEnumerate Users by Bruteforcing RIDchevron-rightEnumerate Domain Groupschevron-rightEnumerate Local Groupschevron-rightEnumerate Domain Password Policychevron-right🆕Enumerate Primary Site Server and Distribution Point via recon6chevron-right
PreviousScan for Vulnerabilitieschevron-leftNextEnumerate Hostschevron-right

Last updated 6 days ago

Was this helpful?

Was this helpful?