Skip to content
Automating Network Exploits with NetExec w/ Dale Hobbs
1.
How likely are you to incorporate NetExec into your security assessments, audits, or defensive monitoring practices going forward?
Very likely
Likely
Somewhat likely
Neither likely nor unlikely
Somewhat unlikely
Unlikely
Very unlikely
2.
How confident are you in explaining the difference between SMB and LDAP enumeration techniques(e.g., shares, users, groups)?
Extremely confident
Very confident
Somewhat confident
Not so confident
Not at all confident
3.
How confident are you that you could run at least one NetExec workflow (targets + credentials + actions) in your own lab or environment?
Extremely confident
Very confident
Somewhat confident
Not so confident
Not at all confident
4.
Which areas of NetExec would you like deeper technical coverage on?
5.
How useful do you find NetExec’s structured logging and reporting features for turning technical output into business-level risk insights?
Extremely useful
Very useful
Somewhat useful
Not so useful
Not at all useful
6.
Did the section on turning raw NetExec output into risk-based executive reporting give you practical ideas you could use?
Yes
No
7.
What is the single most important concept or takeaway you’re leaving with today regarding NetExec’s role in testing and defending Active Directory