Here’s a detailed look at NetExec, a powerful tool in the cybersecurity and penetration testing world:
🧰 What Is NetExec?
NetExec (also known as nxc) is an open-source network exploitation tool used for:
- Network reconnaissance
- Automated authentication testing
- Lateral movement
- Security assessments
It’s especially useful in Active Directory (AD) environments, helping red teamers and penetration testers automate tasks across large networks.
🔍 Key Features
NetExec supports a wide range of protocols and modules, making it incredibly versatile:
🔌 Protocols Supported | 🧪 Capabilities |
---|---|
SMB, SSH, LDAP, FTP, WMI, WinRM, RDP, MSSQL, NFS | Password spraying, authentication, command execution, file transfer, enumeration, privilege escalation |
Some standout features include:
- Password spraying across multiple protocols
- Kerberos and certificate-based authentication
- Enumeration of domain users, groups, trusts, and GPOs
- Dumping credentials and secrets (e.g., LAPS, gMSA)
- Integration with BloodHound for AD mapping
- Exploitation modules for ADCS, delegation, and more
🧠 Why Use NetExec?
NetExec is a successor to CrackMapExec, redesigned for better modularity and extensibility. It’s favored for:
- Speed and automation: Quickly test credentials across many hosts.
- OpSec awareness: Includes options to minimize detection.
- Modular design: Easily extend with custom modules.
- Cross-platform support: Works on Linux and Windows.
🚀 Getting Started
To install NetExec:
# Using pipx (recommended)
pip install pipx
python -m pipx ensurepath
pipx install git+ https://github.com/Pennyw0rth/NetExec
Then you can run commands like:
nxc smb 192.168.1.0/24 -u 'admin' -p 'password123' -M lsassy
This example performs SMB authentication and runs the lsassy
module to extract credentials from memory.
📚 Learn More
You can explore tutorials and documentation on the official NetExec wiki or check out this intro guide from Black Hills InfoSec.