Advertisement ยท 728 ร— 90
#
Hashtag
#netexec
Advertisement ยท 728 ร— 90
Preview
NetExec for Pentester: Command Execution NetExec (nxc) is a modern post-exploitation and lateral movement tool that enables penetration testers to execute commands across SMB, WinRM, WMI, MSSQL, RDP, and SSH using credentials, hashes, tickets, or certificates. It supports advanced techniques like Pass-the-Hash, Pass-the-Ticket, and Pass-the-Certificate (PKINIT) for moving laterally in Active Directory environments and can leverage services like xp_cmdshell for SYSTEM-level escalation. #NetExec #ActiveDirectory

NetExec (nxc) enables penetration testers to execute commands remotely via SMB, WinRM, WMI, MSSQL, RDP using credentials, hashes, tickets, or certificates. Supports Pass-the-Hash, Pass-the-Ticket, and PKINIT. #NetExec #LateralMovement

0 0 0 0
Preview
GitHub - Pennyw0rth/NetExec-Lab: Lab used for workshop and CTF Lab used for workshop and CTF. Contribute to Pennyw0rth/NetExec-Lab development by creating an account on GitHub.

github.com/Pennyw0rth/N... I feel a netexec theme today apparently. This is a netexec lab you can build to play around with Active directory. may be worth a shot if you are practicing for OSCP or just want to level up AD #ActiveDirectory #RedTeam #Netexec

1 0 0 0
NetExec 3 Building Blocks #cybersecurity #infosec #netexec #exploits
NetExec 3 Building Blocks #cybersecurity #infosec #netexec #exploits /// ๐Ÿ”— Register for webcasts, summits, and workshops - https://poweredbybhis.com ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec Services Active SOC: https://www.blackhillsinfosec.com/services/active-soc/ Penetration Testing: https://www.blackhillsinfosec.com/services/ Incident Response: https://www.blackhillsinfosec.com/services/incident-response/ ///Backdoors & Breaches - Incident Response Card Game Backdoors & Breaches: https://www.backdoorsandbreaches.com/ Play B&B Online: https://play.backdoorsandbreaches.com/ ///Antisyphon Training Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/ Live Training: https://www.antisyphontraining.com/course-catalog/ On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/ Antisyphon Discord: https://discord.gg/antisyphon Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training ///Educational Infosec Content Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/ Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining Active Countermeasures YouTube: https://youtube.com/activecountermeasures Threat Hunter Community Discord: https://discord.gg/threathunter Join us at the annual information security conference in Deadwood, SD (in-person and virtually) โ€” Wild West Hackin' Fest: https://wildwesthackinfest.com/

Originally from From BHIS: NetExec 3 Building Blocks #cybersecurity #infosec #netexec #exploits ( :-{ฤฑโ–“ #BlackHillsInfoSec #cybersecurity #cyberresearch

1 0 0 0
From Raw Output to Executive Reports #cybersecurity #netexec #exploits
From Raw Output to Executive Reports #cybersecurity #netexec #exploits /// ๐Ÿ”— Register for webcasts, summits, and workshops - https://poweredbybhis.com ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec Services Active SOC: https://www.blackhillsinfosec.com/services/active-soc/ Penetration Testing: https://www.blackhillsinfosec.com/services/ Incident Response: https://www.blackhillsinfosec.com/services/incident-response/ ///Backdoors & Breaches - Incident Response Card Game Backdoors & Breaches: https://www.backdoorsandbreaches.com/ Play B&B Online: https://play.backdoorsandbreaches.com/ ///Antisyphon Training Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/ Live Training: https://www.antisyphontraining.com/course-catalog/ On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/ Antisyphon Discord: https://discord.gg/antisyphon Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training ///Educational Infosec Content Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/ Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining Active Countermeasures YouTube: https://youtube.com/activecountermeasures Threat Hunter Community Discord: https://discord.gg/threathunter Join us at the annual information security conference in Deadwood, SD (in-person and virtually) โ€” Wild West Hackin' Fest: https://wildwesthackinfest.com/

Originally from From BHIS: From Raw Output to Executive Reports #cybersecurity #netexec #exploits ( :-{ฤฑโ–“ #BlackHillsInfoSec #cybersecurity #cyberresearch

1 0 0 0
Post image

New module on #NetExec : wam
Dump #Entra access tokens from Windows Token Broker Cache, and make your way to Entra ๐Ÿš€

Thanks @xpnsec.com for the technique! More info on his blog : blog.xpnsec.com/wam-bam/

21 12 0 0