Skip to content

Commit

Permalink
Replaced crackmapexec with netexec
Browse files Browse the repository at this point in the history
Replaced crackmapexec with netexec since cme is no longer being maintained see also: https://github.com/byt3bl33d3r/CrackMapExec
  • Loading branch information
Eagleo0 committed Mar 5, 2024
1 parent fe88c9b commit 6128703
Show file tree
Hide file tree
Showing 14 changed files with 173 additions and 173 deletions.
27 changes: 0 additions & 27 deletions _wadcoms/Crackmapexec-Enum-LDAP.md

This file was deleted.

22 changes: 0 additions & 22 deletions _wadcoms/Crackmapexec-Enum-SMB-Anonymous.md

This file was deleted.

22 changes: 0 additions & 22 deletions _wadcoms/Crackmapexec-Enum-SMB-Null.md

This file was deleted.

22 changes: 0 additions & 22 deletions _wadcoms/Crackmapexec-Enum-SMB-Relay-List.md

This file was deleted.

27 changes: 0 additions & 27 deletions _wadcoms/Crackmapexec-Enum-SMB.md

This file was deleted.

27 changes: 0 additions & 27 deletions _wadcoms/Crackmapexec-Exec-SMB.md

This file was deleted.

26 changes: 0 additions & 26 deletions _wadcoms/Crackmapexec-SMB-Password-Spray.md

This file was deleted.

27 changes: 27 additions & 0 deletions _wadcoms/NetExec-Enum-LDAP.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will enumerate domain groups, local groups, users, user descriptions, users trusted for delegation, users without a password, You can also use CIDR notation to target a range of ip addresses (i.e. 10.10.10.0/24).
Command Reference:
Target IP: 10.10.10.1
Username: john
Password: password123
command: |
nxc ldap 10.10.10.1 -u 'john' -p 'password123' --trusted-for-delegation --password-not-required --admin-count --users --groups
items:
- Username
- Password
services:
- LDAP
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
22 changes: 22 additions & 0 deletions _wadcoms/NetExec-Enum-SMB-Anonymous.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will enumerate the SMB host using anonymous access.
Command Reference:
Target IP: 10.10.10.1
command: |
nxc smb 10.10.10.1 -u 'a' -p ''
items:
- No_Creds
services:
- SMB
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
22 changes: 22 additions & 0 deletions _wadcoms/NetExec-Enum-SMB-Null.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will enumerate the SMB host using a null session.
Command Reference:
Target IP: 10.10.10.1
command: |
nxc smb 10.10.10.1 -u '' -p ''
items:
- No_Creds
services:
- SMB
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
22 changes: 22 additions & 0 deletions _wadcoms/NetExec-Enum-SMB-Relay-List.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. The following command will enumerate a list of SMB hosts with signing not enforced, allowing you to relay credentials to them using ntlmrelayx.py.
Command Reference:
SMB Hosts: smb_hosts.txt
command: |
nxc smb smb_host.txt --gen-relay-list output.txt
items:
- No_Creds
services:
- SMB
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
27 changes: 27 additions & 0 deletions _wadcoms/NetExec-Enum-SMB.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will enumerate domain groups, local groups, logged on users, relative identifiers (RIDs), sessions, domain users, SMB shares/permissions, and get the domain password policy. You can also use CIDR notation to target a range of ip addresses (i.e. 10.10.10.0/24).
Command Reference:
Target IP: 10.10.10.1
Username: john
Password: password123
command: |
nxc smb 10.10.10.1 -u 'john' -p 'password123' --groups --local-groups --loggedon-users --rid-brute --sessions --users --shares --pass-pol
items:
- Username
- Password
services:
- SMB
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
27 changes: 27 additions & 0 deletions _wadcoms/NetExec-Exec-SMB.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will execute a powershell command on the target machine if the user has Administrator privileges. using "-x" will execute from cmd.
Command Reference:
Target IP: 10.10.10.1
Username: john
Password: password123
command: |
nxc smb 10.10.10.1 -u 'john' -p 'password123' -X '$Host'
items:
- Username
- Password
services:
- SMB
attack_types:
- Exploitation
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
26 changes: 26 additions & 0 deletions _wadcoms/NetExec-SMB-Password-Spray.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will perform password spraying over SMB against the domain controller.
Command Reference:
Domain Controller IP: 10.10.10.1
Username List: users.txt
Password: password123
command: |
nxc smb 10.10.10.1 -u users.txt -p password123
items:
- Username
services:
- SMB
attack_types:
- Exploitation
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---

0 comments on commit 6128703

Please sign in to comment.