Beacon's Net Module
Beacon’s net module provides tools to interrogate and discover targets in a Windows active directory network.
Use net [pid] [arch] [command] [arguments] to inject the network and host enumeration tool into the specified process. Use net [command] [arguments] (without [pid] and [arch] arguments) to spawn a temporary process and inject the network and host enumeration tool into it. An exception is the net domain command which is implemented as a BOF.net domain.
The commands in Beacon’s net module are built on top of the Windows Network Enumeration APIs. Most of these commands are direct replacements for many of the built-in net commands in Windows (there are also a few unique capabilities here as well). The following commands are available:
Usage: net [COMMAND] [ARGUMENTS]
Last updated