Netexec (former CME)
A swiss army knife for pentesting networks
Detect Windows hosts
netexec smb 192.168.1.0/24Validate Credentials
Credentials can be quickly checked using CME, either plaintext passwords or hashes
netexec smb 192.168.1.2 -u Administrator -p 'password123'
netexec smb 172.16.229.188 -u Joe -H 77f944ff6e0c0ed0c83dcef57bdf9298Make sure to also check discovered local account credentials
netexec smb 172.16.229.188 -u Administrator -p 'password123' --local-auth--local-auth signifies a local account, otherwise CME will default to domain user
Brute
Try a single password against all users, write console + write to file
netexec smb 192.168.0.1 -u users_enabled.txt -p pass123 --continue-on-success | tee -a brute.txtTry username same as password, write console + write to file
netexec smb 192.168.0.1 -u users_enabled.txt -p users_enabled.txt --continue-on-success --no-bruteforce | tee -a same_brute.txt(note --no-bruteforce)
Password Spraying
Can brute against multitude of services
--local-auth signifies a local account, otherwise CME will default to domain user
CME's RDP password spraying module seems inconsistent, use -> RDP Password Spraying
Last updated