Automating Network Exploits with NetExec w/ Dale Hobbs

1.How likely are you to incorporate NetExec into your security assessments, audits, or defensive monitoring practices going forward?
2.How confident are you in explaining the difference between SMB and LDAP enumeration techniques(e.g., shares, users, groups)?
3.How confident are you that you could run at least one NetExec workflow (targets + credentials + actions) in your own lab or environment?
4.Which areas of NetExec would you like deeper technical coverage on?
5.How useful do you find NetExec’s structured logging and reporting features for turning technical output into business-level risk insights?
6.Did the section on turning raw NetExec output into risk-based executive reporting give you practical ideas you could use?
7.What is the single most important concept or takeaway you’re leaving with today regarding NetExec’s role in testing and defending Active Directory