Options (3)
-u, --usernamebooleanSearch for valid domain credentials by trying out every combination in the specified lists of usernames and passwords
Example:
nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}-p, --passwordbooleanSearch for valid domain credentials by trying out every combination in the specified lists of usernames and passwords
Example:
nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}-c, --collectionbooleanCollect data about the targeted domain and automatically import these data into BloodHound
Example:
nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --bloodhound {{[-c|--collection]}} {{All}}Examples (5)
Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords
nxc ldap 192.168.178.2 [-u|--username] path/to/usernames.txt [-p|--password] path/to/passwords.txtEnumerate active domain users
nxc ldap 192.168.178.2 [-u|--username] username [-p|--password] password --active-usersCollect data about the targeted domain and automatically import these data into BloodHound
nxc ldap 192.168.178.2 [-u|--username] username [-p|--password] password --bloodhound [-c|--collection] AllAttempt to collect AS_REP messages for the specified user in order to perform an ASREPRoasting attack
nxc ldap 192.168.178.2 [-u|--username] username [-p|--password] '' --asreproast path/to/output.txtAttempt to extract the passwords of group managed service accounts on the domain
nxc ldap 192.168.178.2 [-u|--username] username [-p|--password] password --gmsamade by @shridhargupta | data from tldr-pages