commands.sh

nxc ldap

all

Pentest and exploit Windows Active Directory Domains via LDAP.

More info →

Options (3)

-u, --usernameboolean

Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords

Example: nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}
-p, --passwordboolean

Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords

Example: nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}
-c, --collectionboolean

Collect data about the targeted domain and automatically import these data into BloodHound

Example: nxc ldap {{192.168.178.2}} {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}} --bloodhound {{[-c|--collection]}} {{All}}

Examples (5)

Search for valid domain credentials by trying out every combination in the specified lists of usernames and passwords

nxc ldap 192.168.178.2 [-u|--username] path/to/usernames.txt [-p|--password] path/to/passwords.txt

Enumerate active domain users

nxc ldap 192.168.178.2 [-u|--username] username [-p|--password] password --active-users

Collect data about the targeted domain and automatically import these data into BloodHound

nxc ldap 192.168.178.2 [-u|--username] username [-p|--password] password --bloodhound [-c|--collection] All

Attempt to collect AS_REP messages for the specified user in order to perform an ASREPRoasting attack

nxc ldap 192.168.178.2 [-u|--username] username [-p|--password] '' --asreproast path/to/output.txt

Attempt to extract the passwords of group managed service accounts on the domain

nxc ldap 192.168.178.2 [-u|--username] username [-p|--password] password --gmsa
made by @shridhargupta | data from tldr-pages