Explore tweets tagged as #netexec
@al3x_n3ff
Alex Neff
2 months
A new NetExec module: certipy-find🔥 As ADCS is still configured insecurely in many environments, I decided to integrate the certipy find command into NetExec. Now you can quickly find and enumerate vulnerable templates before bringing out the big guns.
10
141
621
@mpgn_x64
mpgn
5 months
Wanna see something cool about RDP and NetExec ?
22
183
978
@Defte_
Aurélien Chalot
2 months
Dumping LSASS is old school. If an admin is connected on a server you are local admin on, just create a scheduled task asking for a certificate on his behalf, get the cert, get its privs. All automatized in the schtask_as module for NetExec 🥳🥳🥳
5
192
928
@al3x_n3ff
Alex Neff
1 day
Dumping juicy secrets from SAM/LSA is always nice right? I've added an implementation for the --sam and --lsa flags to the MSSQL protocol of NetExec🚀 No need for manual registry hive extraction anymore!
9
52
252
@al3x_n3ff
Alex Neff
3 months
Two new low privilege enumeration modules just got merged into NetExec🔥Made by @j_debats - sccm-recon6: Enumerate SCCM Distribution Point and Site Server information - ntlm_reflection: Check if the target is vulnerable to the NTLM reflection attack (CVE-2025-33073)
3
69
292
@al3x_n3ff
Alex Neff
9 days
A new module just got merged into NetExec: raisechild🔥 Made by azoxlpf to automatically abuse domain trust to pivot to other domains. It will: - Dump the krbtgt hash of the child domain - Enumerate trusted domains - Craft a TGT for trusted/parent domain
4
81
377
@al3x_n3ff
Alex Neff
26 days
NetExec turned 2 years old this month🎉 Time to take a look at what have achieved so far! As I love stats, I want to share some imo interesting numbers about NetExec: 4,853⭐ ~100,000 clones/14 days => ~2,4mio clones ~7,200 unique clones/14 days => ~172,800 unique clones 1/4🧵
5
21
141
@al3x_n3ff
Alex Neff
5 months
Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable. This allows you to request service tickets for any account with a set SPN🔥 NetExec now has a native implementation of this technique, thanks to Azox
7
118
471
@hack_sparo
Hacksparo 🥷👾
1 year
My network security friends, rate this tool #netexec
2
3
41
@al3x_n3ff
Alex Neff
6 months
NetExec now has native checks for LDAP signing and channel binding capabilities of the target DC, thanks to the implementation of @_zblurx 🚀 I also fixed querying LDAP with non-ASCII characters, so you can finally query groups such as "Dämonen-Administratoren"🎉
7
83
361
@al3x_n3ff
Alex Neff
5 days
Late to the party, but better late than never right? The module "drop-library-ms" made by @Xed_sama is now merged into NetExec🚀 It drops a .library-ms file onto writable shares to get NTLM hashes when a user visits the directory, exploiting CVE-2025-24071.
0
34
137
@mpgn_x64
mpgn
3 months
If you want to quickly check whether the guest account is enabled, you can now do it with NetExec. This is not enabled by default you need to set the custom flag check_guest_account in your nxc.conf file. Maybe one day it will be set to true by default 🪂
4
32
170
@al3x_n3ff
Alex Neff
6 months
What do you do if you have compromised a server administrator? Hunt for domain admins🏹 This is what NetExec's latest module "presence" does. It checks for DAs in: - C:\Users folder - Processes - Scheduled Tasks All done with native Windows protocols. Made by crosscutsaw and me
3
109
427
@sekurlsa_pw
🕳
3 months
Reading Impacket merges: BadSuccessor is now in examples. GetST now has -dmsa https://t.co/10IcRmoIEe https://t.co/JxcRxC2xs3 Secretsdump also got a patch to not crash w2019 DCs. NetExec removed the warning that --ntds can crash 2019.
0
42
166
@_zblurx
Thomas Seigneuret
2 years
New feature in #NetExec : S4U2Self and S4U2Proxy support and automation with --delegate and --self It allows you to abuse KCD with protocol transition and RBCD automatically in NetExec, and use directly all the postex functionalities 🔥 For example with RBCD:
5
95
320
@al3x_n3ff
Alex Neff
5 months
How to find the Entra ID sync server - A new NetExec module🔎 Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server. Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server🚀
10
139
499