Skip to content

Commit

Permalink
Merge pull request #29 from Eagleo0/master
Browse files Browse the repository at this point in the history
Replaced crackmapexec with netexec
  • Loading branch information
JohnWoodman authored Apr 8, 2024
2 parents fe88c9b + 6128703 commit e692640
Show file tree
Hide file tree
Showing 14 changed files with 173 additions and 173 deletions.
27 changes: 0 additions & 27 deletions _wadcoms/Crackmapexec-Enum-LDAP.md

This file was deleted.

22 changes: 0 additions & 22 deletions _wadcoms/Crackmapexec-Enum-SMB-Anonymous.md

This file was deleted.

22 changes: 0 additions & 22 deletions _wadcoms/Crackmapexec-Enum-SMB-Null.md

This file was deleted.

22 changes: 0 additions & 22 deletions _wadcoms/Crackmapexec-Enum-SMB-Relay-List.md

This file was deleted.

27 changes: 0 additions & 27 deletions _wadcoms/Crackmapexec-Enum-SMB.md

This file was deleted.

27 changes: 0 additions & 27 deletions _wadcoms/Crackmapexec-Exec-SMB.md

This file was deleted.

26 changes: 0 additions & 26 deletions _wadcoms/Crackmapexec-SMB-Password-Spray.md

This file was deleted.

27 changes: 27 additions & 0 deletions _wadcoms/NetExec-Enum-LDAP.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will enumerate domain groups, local groups, users, user descriptions, users trusted for delegation, users without a password, You can also use CIDR notation to target a range of ip addresses (i.e. 10.10.10.0/24).
Command Reference:
Target IP: 10.10.10.1
Username: john
Password: password123
command: |
nxc ldap 10.10.10.1 -u 'john' -p 'password123' --trusted-for-delegation --password-not-required --admin-count --users --groups
items:
- Username
- Password
services:
- LDAP
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
22 changes: 22 additions & 0 deletions _wadcoms/NetExec-Enum-SMB-Anonymous.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will enumerate the SMB host using anonymous access.
Command Reference:
Target IP: 10.10.10.1
command: |
nxc smb 10.10.10.1 -u 'a' -p ''
items:
- No_Creds
services:
- SMB
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
22 changes: 22 additions & 0 deletions _wadcoms/NetExec-Enum-SMB-Null.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will enumerate the SMB host using a null session.
Command Reference:
Target IP: 10.10.10.1
command: |
nxc smb 10.10.10.1 -u '' -p ''
items:
- No_Creds
services:
- SMB
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
22 changes: 22 additions & 0 deletions _wadcoms/NetExec-Enum-SMB-Relay-List.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. The following command will enumerate a list of SMB hosts with signing not enforced, allowing you to relay credentials to them using ntlmrelayx.py.
Command Reference:
SMB Hosts: smb_hosts.txt
command: |
nxc smb smb_host.txt --gen-relay-list output.txt
items:
- No_Creds
services:
- SMB
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
27 changes: 27 additions & 0 deletions _wadcoms/NetExec-Enum-SMB.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will enumerate domain groups, local groups, logged on users, relative identifiers (RIDs), sessions, domain users, SMB shares/permissions, and get the domain password policy. You can also use CIDR notation to target a range of ip addresses (i.e. 10.10.10.0/24).
Command Reference:
Target IP: 10.10.10.1
Username: john
Password: password123
command: |
nxc smb 10.10.10.1 -u 'john' -p 'password123' --groups --local-groups --loggedon-users --rid-brute --sessions --users --shares --pass-pol
items:
- Username
- Password
services:
- SMB
attack_types:
- Enumeration
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
27 changes: 27 additions & 0 deletions _wadcoms/NetExec-Exec-SMB.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will execute a powershell command on the target machine if the user has Administrator privileges. using "-x" will execute from cmd.
Command Reference:
Target IP: 10.10.10.1
Username: john
Password: password123
command: |
nxc smb 10.10.10.1 -u 'john' -p 'password123' -X '$Host'
items:
- Username
- Password
services:
- SMB
attack_types:
- Exploitation
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---
26 changes: 26 additions & 0 deletions _wadcoms/NetExec-SMB-Password-Spray.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
---
description: |
"NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks." - https://www.netexec.wiki/. This command will perform password spraying over SMB against the domain controller.
Command Reference:
Domain Controller IP: 10.10.10.1
Username List: users.txt
Password: password123
command: |
nxc smb 10.10.10.1 -u users.txt -p password123
items:
- Username
services:
- SMB
attack_types:
- Exploitation
OS:
- Linux
references:
- https://github.com/Pennyw0rth/NetExec
- https://www.netexec.wiki/
---

0 comments on commit e692640

Please sign in to comment.