Explore tweets tagged as #netexec
@hackinarticles
Hacking Articles
1 month
Tweet media one
Tweet media two
Tweet media three
Tweet media four
6
134
465
@al3x_n3ff
Alex Neff
3 months
NetExec v1.4.0 has been released! 🎉. There is a HUGE number of new features and improvements, including:.- backup_operator: Automatic priv esc for backup operators.- Certificate authentication.- NFS escape to root file system. And much more!.Full rundown:.
Tweet media one
9
247
796
@mpgn_x64
mpgn
9 days
Wanna see something cool about RDP and NetExec ?
Tweet media one
22
167
915
@al3x_n3ff
Alex Neff
1 month
What do you do if you have compromised a server administrator? Hunt for domain admins🏹. This is what NetExec's latest module "presence" does. It checks for DAs in:.- C:\Users folder.- Processes.- Scheduled Tasks. All done with native Windows protocols. Made by crosscutsaw and me
Tweet media one
3
109
430
@al3x_n3ff
Alex Neff
28 days
Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable. This allows you to request service tickets for any account with a set SPN🔥. NetExec now has a native implementation of this technique, thanks to Azox
Tweet media one
7
116
471
@al3x_n3ff
Alex Neff
13 days
How to find the Entra ID sync server - A new NetExec module🔎. Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server. Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server🚀
Tweet media one
10
131
452
@mpgn_x64
mpgn
2 months
Based on the research of Akamai, I made a new module on netexec to find every principal that can perform a BadSuccessor attack and the OUs where it holds the required permissions 🔥.
Tweet media one
@YuG0rd
Yuval Gordon
2 months
🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability.It allows compromising any user in AD, it works with the default config, and. Microsoft currently won't fix it 🤷‍♂️.Read Here -
Tweet media one
4
120
429
@al3x_n3ff
Alex Neff
2 months
A new module has been merged into NetExec: change-password🔥. Accounts with STATUS_PASSWORD_EXPIRED aren't a problem anymore, just reset their password. You can also abuse ForceChangePassword to reset another user's password. Made by @kriyosthearcane, @mehmetcanterman and me
Tweet media one
3
118
414
@al3x_n3ff
Alex Neff
1 month
NetExec now has native checks for LDAP signing and channel binding capabilities of the target DC, thanks to the implementation of @_zblurx 🚀. I also fixed querying LDAP with non-ASCII characters, so you can finally query groups such as "Dämonen-Administratoren"🎉
Tweet media one
7
81
364
@Secfortress
Secfortress
4 months
#OSCP Feast Network Pwned. This gave me deep insight into AWS enumeration and exploiting poorly secured S3 buckets. Active Directory was EZPZ using just BloodHound, NetExec, net rpc, and Evil-WinRM.
Tweet media one
Tweet media two
Tweet media three
2
5
40
@al3x_n3ff
Alex Neff
5 months
Finally, two new options by @Defte_ got merged into NetExec🔥. --qwinsta: Enumerate active sessions on the target, including numerous useful information.--tasklist: Well. enumerates all running tasks on the host. Update & enjoy the new reconnaissance flags🔎
Tweet media one
5
74
290
@hackthebox_eu
Hack The Box
16 days
Let's crack on 🧨.From a passion project to an essential tool, #NetExec has become a go-to resource for many in the cybersecurity space. Join us as we sit down live on YouTube with @mpgn_x64, the mind behind it all, to talk open source, persistence, and the personal journey of
Tweet media one
0
21
120
@_zblurx
Thomas Seigneuret
2 years
New feature in #NetExec : S4U2Self and S4U2Proxy support and automation with --delegate and --self. It allows you to abuse KCD with protocol transition and RBCD automatically in NetExec, and use directly all the postex functionalities 🔥. For example with RBCD:
Tweet media one
5
94
320
@_zblurx
Thomas Seigneuret
7 months
New module on #NetExec : wam.Dump #Entra access tokens from Windows Token Broker Cache, and make your way to Entra 🚀. Thanks @_xpn_ for the technique! More info on his blog :
Tweet media one
7
162
492
@al3x_n3ff
Alex Neff
2 months
A new NetExec module just got merged: eventlog_creds🔥. It parses Windows Event ID 4688 logs (from "Audit Process Creation") to extract credentials from CMD and PowerShell commands. E.g. "net user username password /add" will be detected. Made by @lodos2005
Tweet media one
4
81
431
@PinguinoDeMario
El Pingüino De Mario
10 months
Ejemplo de como funciona un ataque Pass-The-Hash en entornos Windows, de tal forma que podremos autenticarnos con un usuario utilizando su hash en lugar de su contraseña. #activedirectory #ciberseguridad #kalilinux #windows #informatica #netexec #impacket #crackmapexec #dominio
0
83
448
@hack_sparo
Hacksparo 🥷👾
1 year
My network security friends, rate this tool #netexec
Tweet media one
2
3
42
@AppleEyedOne
Rich🇺🇸Graves🍎📱🥽d Oxford📙Dawn👨🏻‍💻
10 hours
Samba, by Andrew Tridgell, is only 32 years old. Xi was 40 and she was 11 when that happened. CVE-2025-33073 is easily demonstrated for Ms Simiao by Minnesota State Senator Eric Lucero (R-Saint Michael). Ivanka got over IT eventually but the rest of us might be netexec’d. #vss365
Tweet media one
Tweet media two
Tweet media three
Tweet media four
@dodgerbluealldy
ladodgerfan4life
19 hours
0
0
2
@mpgn_x64
mpgn
6 months
So you want to exploit ADCS ESC8 with only netexec and ntlmrelayx ? Fear not my friend, I will show you how to do it 👇 . NetExec now supports "Pass-the-Cert" as an authentication method, thanks to @_dirkjan original work on PKINITtools ⛱️
Tweet media one
9
169
629